Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32003: Denial of Service in 100GbE Intel(R) Ethernet Network Adapter E810

0
Medium
VulnerabilityCVE-2025-32003cvecve-2025-32003
Published: Tue Feb 10 2026 (02/10/2026, 16:25:41 UTC)
Source: CVE Database V5
Product: 100GbE Intel(R) Ethernet Network Adapter E810

Description

Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before version cvl fw 1.7.6, cpk 1.3.7 within Ring 0: Bare Metal OS may allow a denial of service. Network adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via network access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 16:50:29 UTC

Technical Analysis

CVE-2025-32003 is a firmware vulnerability in Intel's 100GbE Ethernet Network Adapter E810, specifically in firmware versions before cvl fw 1.7.6 and cpk 1.3.7. The issue is an out-of-bounds read occurring within the adapter's firmware operating in Ring 0 Bare Metal OS, which can be exploited to cause a denial of service (DoS). The attack vector is network-based, requiring an authenticated user with low complexity attack methods combined with special internal knowledge of the system. No user interaction is necessary, and the vulnerability does not compromise confidentiality or integrity but severely impacts availability by potentially causing system crashes or network adapter failures. The CVSS 4.0 base score is 6.0, reflecting medium severity, with attack vector as network, low attack complexity, partial authentication required, and no user interaction. The vulnerability is notable because it affects high-speed network adapters critical in data centers and enterprise environments, where availability is paramount. No public exploits have been reported, but the risk remains for targeted attacks in environments where these adapters are deployed. Intel has not provided direct patch links in the provided data, but upgrading firmware to versions 1.7.6 or later is the recommended remediation.

Potential Impact

For European organizations, especially those operating large-scale data centers, cloud services, or telecommunications infrastructure, this vulnerability poses a risk of network disruption through denial of service. The affected Intel 100GbE Ethernet adapters are commonly used in high-performance networking environments, so exploitation could lead to significant downtime, impacting business continuity and service availability. Although confidentiality and integrity are not affected, the loss of availability can disrupt critical services, cause financial losses, and damage reputation. Organizations relying on these adapters for backbone network connectivity or high-speed data transfer could experience degraded performance or outages. The requirement for authenticated access and special internal knowledge somewhat limits the threat to insider attackers or sophisticated adversaries with network access, but the low attack complexity means that once conditions are met, exploitation is feasible. This vulnerability could also affect managed service providers and cloud operators serving European customers, amplifying the impact.

Mitigation Recommendations

1. Immediately verify the firmware version of Intel 100GbE Ethernet Network Adapter E810 devices and upgrade to firmware version cvl fw 1.7.6 or later and cpk 1.3.7 or later as soon as Intel releases official patches. 2. Restrict network access to management interfaces and authenticated users to trusted personnel only, employing strong authentication mechanisms and network segmentation to limit exposure. 3. Monitor network traffic and adapter behavior for signs of abnormal activity or crashes that could indicate exploitation attempts. 4. Implement strict access controls and logging on systems using these adapters to detect and respond to suspicious authenticated network activity. 5. Coordinate with Intel support and hardware vendors to receive timely updates and advisories. 6. Consider deploying network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns targeting these adapters. 7. Conduct regular security audits and firmware inventory to ensure compliance with patching policies. 8. Prepare incident response plans specifically addressing denial of service scenarios involving network hardware failures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:18:44.531Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5e4b57a58fa119cf68

Added to database: 2/10/2026, 4:31:26 PM

Last enriched: 2/10/2026, 4:50:29 PM

Last updated: 2/21/2026, 12:22:01 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats