First published: Wed Aug 14 2024(Updated: )
Protection mechanism failure in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an unauthenticated user to potentially enable denial of service via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel 800 Series Ethernet Driver | <28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23499 has a severity level that indicates it may allow denial of service due to a protection mechanism failure.
To fix CVE-2024-23499, upgrade the Linux kernel mode driver for Intel Ethernet 800 Series Controllers to version 28.3 or later.
CVE-2024-23499 affects users of Intel(R) Ethernet Network Controllers and Adapters E810 Series with specific driver versions before 28.3.
CVE-2024-23499 could potentially enable denial of service attacks by allowing unauthenticated users to exploit the vulnerability.
The specific reporting date for CVE-2024-23499 is not provided, but it relates to vulnerabilities in Intel products before version 28.3.