CVE-2025-22893
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-08-13
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | 800_series_ethernet | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-691 | The code does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to insufficient control flow management in the Linux kernel-mode driver for some Intel 800 Series Ethernet devices before version 1.17.2. It may allow an authenticated user with local access to potentially escalate their privileges on the system.
How can this vulnerability impact me? :
An attacker who is already authenticated and has local access to the affected system could exploit this vulnerability to escalate their privileges, potentially gaining higher-level access than intended, which could lead to unauthorized actions or control over the system.