High8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:L/SI:L/SA:H

PT-2025-19: Remote code execution in Broadcom P225p NetXtreme-E Dual-port 10Gb/25Gb Ethernet PCIe Adapter, Broadcom NetXtreme-E family

Error type:

Vulnerability vector:

  • Base vulnerability score (CVSSv4.0): CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:L/SI:L/SA:H
  • Severity (CVSSv4.0): 8.2 (high)

Description:

The vulnerability was identified in Broadcom P225p NetXtreme-E Dual-port 10Gb/25Gb Ethernet PCIe Adapter, Broadcom NetXtreme-E family , versions 231.1.162.1 (package version), 1.10.3 (hwrm spec).

The discovered vulnerability is related to stack-based buffer overflow, which leads to arbitrary code execution on the KONG core and the possibility of compromising the entire networking adapter or even other virtual machines/hypervisors.

Vulnerability status: Confirmed by vendor

Date of vulnerability remediation: 10.04.2025

Recommendations:

  • Update the firmware to 2.33 or higher

Researcher: Alexey Kovrizhnykh (Positive Technologies)

Identifiers:

BDU:2025-01825

Vendor:

Broadcom

Vulnerable product:

Broadcom P225p NetXtreme-E Dual-port 10Gb/25Gb Ethernet PCIe Adapter, Broadcom NetXtreme-E family

Vulnerable versions:

231.1.162.1 (package version), 1.10.3 (hwrm spec)