CVE-2025-26697: Denial of Service in Intel(R) 700 Series Ethernet
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI Analysis
Technical Summary
CVE-2025-26697 is a medium-severity vulnerability affecting the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, specifically versions prior to 2.28.5. The flaw involves uncontrolled resource consumption, which can be triggered by an authenticated user with low privileges. This vulnerability does not require user interaction and does not impact confidentiality or integrity but can lead to denial of service (DoS) by exhausting system resources allocated to the network driver. The attack vector is local (AV:L), meaning the attacker must have local access and low privileges (PR:L) on the affected system. The vulnerability does not require elevated privileges or user interaction, and it affects availability by potentially causing the network driver or system to become unresponsive or crash due to resource exhaustion. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet, though upgrading to version 2.28.5 or later is implied to remediate the issue. The vulnerability is specific to Intel 700 Series Ethernet hardware running Linux with the vulnerable driver version, limiting its scope to environments using this hardware and software combination.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability of network services on systems using Intel 700 Series Ethernet adapters with the vulnerable Linux driver. Organizations relying on these network interfaces for critical infrastructure, data centers, or enterprise networks could experience service disruptions if an attacker with local access exploits this vulnerability to cause denial of service. This could affect operational continuity, especially in sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. Since exploitation requires authenticated local access, the risk is higher in environments where multiple users have access to systems or where attackers can gain foothold through other means. The vulnerability does not compromise data confidentiality or integrity directly but can degrade network reliability and availability, potentially impacting business operations and service level agreements.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the Intel 700 Series Ethernet Linux driver to version 2.28.5 or later as soon as it becomes available. Until patches are applied, organizations should restrict local access to systems with vulnerable drivers, enforcing strict access controls and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Network segmentation and limiting user privileges can reduce the attack surface. Additionally, implementing host-based intrusion detection systems (HIDS) to monitor for abnormal driver or network interface behavior can provide early warning. Regular auditing of installed driver versions and maintaining an up-to-date asset inventory will help identify affected systems promptly. For critical systems, consider temporary disabling or replacing vulnerable network adapters if patching is delayed. Finally, educating system administrators about this vulnerability and ensuring timely application of vendor updates is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-26697: Denial of Service in Intel(R) 700 Series Ethernet
Description
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-26697 is a medium-severity vulnerability affecting the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, specifically versions prior to 2.28.5. The flaw involves uncontrolled resource consumption, which can be triggered by an authenticated user with low privileges. This vulnerability does not require user interaction and does not impact confidentiality or integrity but can lead to denial of service (DoS) by exhausting system resources allocated to the network driver. The attack vector is local (AV:L), meaning the attacker must have local access and low privileges (PR:L) on the affected system. The vulnerability does not require elevated privileges or user interaction, and it affects availability by potentially causing the network driver or system to become unresponsive or crash due to resource exhaustion. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet, though upgrading to version 2.28.5 or later is implied to remediate the issue. The vulnerability is specific to Intel 700 Series Ethernet hardware running Linux with the vulnerable driver version, limiting its scope to environments using this hardware and software combination.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability of network services on systems using Intel 700 Series Ethernet adapters with the vulnerable Linux driver. Organizations relying on these network interfaces for critical infrastructure, data centers, or enterprise networks could experience service disruptions if an attacker with local access exploits this vulnerability to cause denial of service. This could affect operational continuity, especially in sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. Since exploitation requires authenticated local access, the risk is higher in environments where multiple users have access to systems or where attackers can gain foothold through other means. The vulnerability does not compromise data confidentiality or integrity directly but can degrade network reliability and availability, potentially impacting business operations and service level agreements.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the Intel 700 Series Ethernet Linux driver to version 2.28.5 or later as soon as it becomes available. Until patches are applied, organizations should restrict local access to systems with vulnerable drivers, enforcing strict access controls and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Network segmentation and limiting user privileges can reduce the attack surface. Additionally, implementing host-based intrusion detection systems (HIDS) to monitor for abnormal driver or network interface behavior can provide early warning. Regular auditing of installed driver versions and maintaining an up-to-date asset inventory will help identify affected systems promptly. For critical systems, consider temporary disabling or replacing vulnerable network adapters if patching is delayed. Finally, educating system administrators about this vulnerability and ensuring timely application of vendor updates is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-02-21T04:00:25.939Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad0034936b
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/20/2025, 1:45:25 AM
Last updated: 10/19/2025, 2:44:10 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumAI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.