CVE-2025-32003
Awaiting Analysis Awaiting Analysis - Queue
Out-of-Bounds Read in Intel E810 Firmware Causes DoS

Publication date: 2026-02-10

Last updated on: 2026-03-17

Assigner: Intel Corporation

Description
Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before version cvl fw 1.7.6, cpk 1.3.7 within Ring 0: Bare Metal OS may allow a denial of service. Network adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via network access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-10
Last Modified
2026-03-17
Generated
2026-05-06
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
intel ethernet_controller to 30.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read issue in the firmware of certain Intel 100GbE Ethernet Network Adapter E810 models before version cvl fw 1.7.6 and cpk 1.3.7. It occurs within Ring 0: Bare Metal OS and may allow a denial of service (DoS) attack.

An attacker who is a network adversary with an authenticated user account and some special internal knowledge can exploit this vulnerability with a low complexity attack. The attack can be performed via network access without requiring any user interaction.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) condition on the affected system. This means the availability of the system can be disrupted or degraded.

There are no impacts on confidentiality or integrity reported for this vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart