Description
Use after free for some Linux kernel driver for the Intel(R) Ethernet 800 series before version 2.3.14 within Ring 0: Kernel may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.
Published: 2026-05-12
Score: 6.8 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free flaw (CWE‑416) in the Linux kernel driver for Intel Ethernet 800 series devices. The flaw can be triggered by an unprivileged software attacker who is authenticated on the host, allowing the kernel to dereference freed memory and crash. The effect is a local denial of service in kernel mode (ring 0) with no impact on confidentiality or integrity. An attacker with a low‑complexity attack could cause the system to become unusable, requiring a reboot.

Affected Systems

Intel Ethernet 800 series drivers bundled with the Linux kernel before version 2.3.14 are affected. The flaw exists in the driver code shipped with these driver packages. Systems deploying those driver versions on Linux kernels are at risk.

Risk and Exploitability

The CVSS score of 6.8 indicates a moderate severity and the EPSS score is not available, but the vulnerability is not listed in CISA’s KEV catalog. The attack requires local access, authentication, and a low‑complexity exploit, meaning a nearby attacker who can run code on the system can readily trigger a crash. The lack of confidentiality or integrity impact limits the damage to service availability.

Generated by OpenCVE AI on May 12, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Intel Ethernet 800 series driver to version 2.3.14 or later, which contains the patch for the use‑after‑free flaw.
  • After upgrading, reboot the system to ensure the new driver is loaded and any stale kernel references are cleared.
  • If an upgrade cannot be performed immediately, disable the affected driver or remap the network interfaces so that the vulnerable code is not exposed to unprivileged users.

Generated by OpenCVE AI on May 12, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Intel Ethernet 800 Series Kernel Driver Enables Local Denial of Service

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Use after free for some Linux kernel driver for the Intel(R) Ethernet 800 series before version 2.3.14 within Ring 0: Kernel may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.
Weaknesses CWE-416
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-12T17:06:55.179Z

Reserved: 2025-04-15T21:26:10.420Z

Link: CVE-2025-27723

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:11.900

Modified: 2026-05-12T17:16:11.900

Link: CVE-2025-27723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T17:30:21Z

Weaknesses