#VU96096 Improper Check for Unusual or Exceptional Conditions in Intel Ethernet Adapter Driver Pack and Non-Volatile Memory (NVM) Update Utility for Intel Ethernet Network Adapter E810 Series


Published: 2024-08-19

Vulnerability identifier: #VU96096

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-21806

CWE-ID: CWE-754

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Intel Ethernet Adapter Driver Pack
Hardware solutions / Firmware
Non-Volatile Memory (NVM) Update Utility for Intel Ethernet Network Adapter E810 Series
Hardware solutions / Drivers

Vendor: Intel

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling in Linux kernel mode driver. A local user can perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Intel Ethernet Adapter Driver Pack: 25.1 - 29.2.1


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability