First published: Wed Aug 14 2024(Updated: )
Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel 800 Series Ethernet Driver | <28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23497 has a high severity rating due to the potential for privilege escalation by authenticated users.
To fix CVE-2024-23497, update the Intel Ethernet 800 Series Controllers Driver to version 28.3 or later.
CVE-2024-23497 affects users of the Intel Ethernet 800 Series Controllers and Adapters using versions prior to 28.3.
CVE-2024-23497 is classified as an out-of-bounds write vulnerability.
CVE-2024-23497 requires local access, so it cannot be exploited remotely.