Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-0153: escalation of privilege in Intel(R) Processors

0
High
VulnerabilityCVE-2021-0153cvecve-2021-0153
Published: Thu May 12 2022 (05/12/2022, 16:36:07 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Processors

Description

Out-of-bounds write in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/03/2025, 10:26:15 UTC

Technical Analysis

CVE-2021-0153 is a high-severity vulnerability affecting certain Intel processors, specifically involving an out-of-bounds write flaw in the BIOS firmware. This vulnerability allows a local privileged user to perform an escalation of privilege attack by exploiting improper bounds checking in the BIOS code. The flaw is categorized under CWE-787, which refers to out-of-bounds writes that can corrupt memory and potentially lead to arbitrary code execution or elevation of privileges. The vulnerability requires local access and some level of privileges (low privileges) to exploit, but does not require user interaction once the attacker has access. The CVSS 3.1 base score is 7.8, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is local, meaning the attacker must have some form of access to the system, but the vulnerability can allow them to escalate their privileges beyond their current level, potentially gaining full control over the affected system. No known exploits in the wild have been reported as of the published date, and no specific patch links are provided, suggesting that mitigation may rely on firmware updates from Intel or system vendors. The vulnerability affects BIOS firmware on Intel processors, which is a critical component responsible for hardware initialization and system boot processes, making exploitation potentially impactful on system stability and security.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Intel processors are widely deployed, including enterprise servers, workstations, and endpoint devices. The ability for a local attacker to escalate privileges could lead to unauthorized access to sensitive data, disruption of critical services, and compromise of system integrity. This is particularly concerning for sectors with high security requirements such as finance, healthcare, government, and critical infrastructure. Since the vulnerability affects BIOS firmware, exploitation could allow attackers to bypass operating system-level security controls, implant persistent malware, or disrupt system availability. The local access requirement means that insider threats or attackers who gain initial footholds via other means could leverage this vulnerability to deepen their control. Given the widespread use of Intel processors across Europe, the potential impact is broad, affecting both private and public sector organizations that rely on Intel-based hardware.

Mitigation Recommendations

Mitigation should focus on applying firmware updates from Intel or the respective hardware vendors as soon as they become available. Organizations should maintain an active inventory of affected Intel processors and monitor vendor advisories for BIOS firmware patches addressing CVE-2021-0153. In the interim, strict access controls should be enforced to limit local access to trusted users only, minimizing the risk of exploitation. Endpoint detection and response (EDR) solutions should be configured to monitor for suspicious local privilege escalation behaviors. Additionally, organizations should implement robust physical security controls to prevent unauthorized physical access to systems. Regular security audits and user privilege reviews can help reduce the attack surface. Where possible, leveraging hardware-based security features such as Intel Trusted Execution Technology (TXT) or enabling secure boot mechanisms may help mitigate exploitation risks. Finally, organizations should educate IT staff about the vulnerability and ensure incident response plans include scenarios involving BIOS-level compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb3af

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 10:26:15 AM

Last updated: 2/7/2026, 7:59:12 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats