Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-8106


A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.9, indicating it can be exploited remotely over the network but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 60 products from intel, from intel, from intel and 57 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2017, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2017-01-09T21:59:00.160

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System intel ethernet_controller_x710_firmware ≤ 5.04 Yes
Hardware intel ethernet_controller_x710-am2_sr1zp - No
Hardware intel ethernet_controller_x710-am2_sr1zq - No
Hardware intel ethernet_controller_x710-bm2_sllkb - No
Hardware intel ethernet_controller_x710-bm2_sllkc - No
Hardware intel ethernet_controller_xl710-am1_sr1zm - No
Hardware intel ethernet_controller_xl710-am1_sr1zn - No
Hardware intel ethernet_controller_xl710-am2_sr1zk - No
Hardware intel ethernet_controller_xl710-am2_sr1zl - No
Hardware intel ethernet_controller_xl710-bm1_sllk9 - No
Hardware intel ethernet_controller_xl710-bm1_sllka - No
Hardware intel ethernet_controller_xl710-bm2_sllk7 - No
Hardware intel ethernet_controller_xl710-bm2_sllk8 - No
Operating System intel ethernet_controller_xl710_firmware ≤ 5.04 Yes
Hardware intel eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5 - No
Hardware intel eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5 - No
Hardware intel eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5 - No
Hardware intel eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5 - No
Hardware intel eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5 - No
Hardware intel ethernet_converged_network_adapter_x710-da2_x710da2 - No
Hardware intel ethernet_converged_network_adapter_x710-da2_x710da2blk - No
Hardware intel ethernet_converged_network_adapter_x710-da2_x710da2g2p5 - No
Hardware intel ethernet_converged_network_adapter_x710-da4_x710da4fh - No
Hardware intel ethernet_converged_network_adapter_x710-da4_x710da4fhblk - No
Hardware intel ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5 - No
Hardware intel ethernet_converged_network_adapter_x710-da4_x710da4g2p5 - No
Hardware intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1 - No
Hardware intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk - No
Hardware intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5 - No
Hardware intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2 - No
Hardware intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk - No
Hardware intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5 - No
Hardware intel ethernet_i\/o_module_xl710-qda1_axx1p40frtiom - No
Hardware intel ethernet_i\/o_module_xl710-qda2_axx2p40frtiom - No
Application hp ethernet_10gb_2-port_562flr-sfp\+ * Yes
Application hp ethernet_10gb_2-port_562sfp\+ * Yes
Application hp ethernet_10gb_4-port_563sfp\+ * Yes
Application hp proliant_xl260a_g9_server * Yes
Application lenovo converged_hx_series 5.05 Yes
Application lenovo converged_hx5500_appliance 5.05 Yes
Application lenovo converged_hx5510_appliance 5.05 Yes
Application lenovo converged_hx7500_appliance 5.05 Yes
Application lenovo converged_hx7510_appliance 5.05 Yes
Application lenovo nextscale_nx360_m5 5.05 Yes
Application lenovo system_x3250_m5 5.05 Yes
Application lenovo system_x3500_m5 5.05 Yes
Application lenovo system_x3550_m5 5.05 Yes
Application lenovo system_x3650_m5 5.05 Yes
Application lenovo system_x3750_m4 5.05 Yes
Application lenovo system_x3850_x6 5.05 Yes
Application lenovo system_x3950_x6 5.05 Yes
Application lenovo thinkagile_cx2200 5.05 Yes
Application lenovo thinkagile_cx4200 5.05 Yes
Application lenovo thinkagile_cx4600 5.05 Yes
Application lenovo thinkserver_rd350 5.05 Yes
Application lenovo thinkserver_rd450 5.05 Yes
Application lenovo thinkserver_rd550 5.05 Yes
Application lenovo thinkserver_rd650 5.05 Yes
Application lenovo thinkserver_sd350 5.05 Yes
Application lenovo thinkserver_td350 5.05 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For intel's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.