Impact
In the Linux kernel's bnxt_en driver, a flaw was discovered wherein a type value obtained from the firmware response was used to index internal arrays. If the firmware returns an unexpected value, the driver may write to or read beyond the bounds of these arrays, resulting in kernel memory corruption and potentially enabling arbitrary code execution with kernel privileges. This weakness corresponds to CWE-787: Out‑of‑Bounds Write and CWE-823: Improper Validation or Sanitization.
Affected Systems
The issue affects systems running the Linux kernel that include the bnxt_en network driver for Broadcom NetXtreme‑E adapters. No specific kernel or firmware version is supplied, so any installation that contains the bnxt_en driver without the patch commit may be vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate risk, and the EPSS score is unavailable, so the exact risk cannot be quantified. The CVE is not listed in the CISA KEV catalog. The bug operates in a kernel driver that processes firmware data; thus, the likely attack vector would require an attacker to manipulate the firmware response or exploit the driver during normal operation, implying a local or compromised‑system escalation scenario. In the absence of an identified exploit, the risk level is considered low to moderate pending further information.
OpenCVE Enrichment