CVE-2025-27535
Insufficient Access Control in Intel E825-C Firmware Causes DoS
Publication date: 2026-02-10
Last updated on: 2026-03-17
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | ethernet_controller | to 30.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-782 | The product implements an IOCTL with functionality that should be restricted, but it does not properly enforce access control for the IOCTL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves an exposed ioctl interface in the firmware of some Intel(R) Ethernet Connection E825-C devices before version NVM 3.84. The ioctl has insufficient access control, which means that a system software adversary with privileged user access and the ability to perform a complex attack could cause a denial of service (DoS) condition. The attack requires local access, does not need special internal knowledge, and does not require user interaction.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS) on the affected system, which affects the availability of the system. There are no impacts on confidentiality or integrity. This means that the system could become unavailable or unresponsive due to the exploit, potentially disrupting operations that rely on the affected Intel Ethernet hardware.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know