Potential security vulnerabilities in some Intel® Ethernet drivers may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2021-33058
Description: Improper access control in the installer Intel® Administrative Tools for Intel® Network Adapters for Windows before version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
CVEID: CVE-2021-33098
Description: Improper input validation in the Intel® Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H****
CVEID: CVE-2021-33059
Description: Improper input validation in the Intel® Administrative Tools for Intel® Network Adapters driver for Windows before version 1.4.0.15 may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 3.9 Low
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L****
Intel® Ethernet 500 Series Controllers driver for Linux before version 3.17.3.
Intel® Administrative Tools for Intel® Network Adapters driver installer for Windows before version 1.4.0.21.
Intel® Administrative Tools for Intel® Network Adapters driver for Windows before version 1.4.0.15.
Intel recommends updating the above Intel® Ethernet software to the latest versions.
Updates are available for download at this location: <https://downloadcenter.intel.com/download/22283/Intel-Ethernet-Adapter-Complete-Driver-Pack>
CVE-2021-33098 was found externally by Asaf Modelevsky (Amazon Web Services).
The remaining issues were found internally by Intel employees.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.