Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00555
HistoryNov 09, 2021 - 12:00 a.m.

Intel® Ethernet Drivers Advisory

2021-11-0900:00:00
Intel Security Center
www.intel.com
19

Summary:

Potential security vulnerabilities in some Intel® Ethernet drivers may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2021-33058

Description: Improper access control in the installer Intel® Administrative Tools for Intel® Network Adapters for Windows before version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****

CVEID: CVE-2021-33098

Description: Improper input validation in the Intel® Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.

CVSS Base Score: 6.5 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H****

CVEID: CVE-2021-33059

Description: Improper input validation in the Intel® Administrative Tools for Intel® Network Adapters driver for Windows before version 1.4.0.15 may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 3.9 Low

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L****

Affected Products:

Intel® Ethernet 500 Series Controllers driver for Linux before version 3.17.3.

Intel® Administrative Tools for Intel® Network Adapters driver installer for Windows before version 1.4.0.21.

Intel® Administrative Tools for Intel® Network Adapters driver for Windows before version 1.4.0.15.

Recommendations:

Intel recommends updating the above Intel® Ethernet software to the latest versions.

Updates are available for download at this location: <https://downloadcenter.intel.com/download/22283/Intel-Ethernet-Adapter-Complete-Driver-Pack&gt;

Acknowledgements:

CVE-2021-33098 was found externally by Asaf Modelevsky (Amazon Web Services).

The remaining issues were found internally by Intel employees.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.