Skip to main content

CVE-2022-25999: escalation of privilege in version

High
VulnerabilityCVE-2022-25999cvecve-2022-25999
Published: Thu Aug 18 2022 (08/18/2022, 19:56:15 UTC)
Source: CVE
Vendor/Project: n/a
Product: version

Description

Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software, all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:27:39 UTC

Technical Analysis

CVE-2022-25999 is a high-severity vulnerability identified in the Intel(R) Enpirion(R) Digital Power Configurator GUI software. The flaw is categorized as an uncontrolled search path element (CWE-427), which allows an authenticated local user to escalate privileges on the affected system. Specifically, the vulnerability arises because the software improperly handles the search path for loading resources or executables, enabling an attacker with limited privileges to influence which files are loaded by placing malicious files in directories that are searched before the legitimate ones. This can lead to arbitrary code execution with elevated privileges, compromising confidentiality, integrity, and availability of the system. The CVSS v3.1 base score is 7.8, reflecting a high impact with local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the potential for privilege escalation on systems running this software. The affected product is the Intel Enpirion Digital Power Configurator GUI software, which is used for configuring power management devices, typically in embedded or industrial environments. The lack of available patches at the time of reporting increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, especially those in industrial, manufacturing, telecommunications, and embedded systems sectors, this vulnerability could have serious consequences. The Intel Enpirion Digital Power Configurator is often used in power management for critical infrastructure and embedded devices. Exploitation could allow an attacker with local access—such as an insider or someone who has gained limited access through other means—to escalate privileges and gain control over the system. This could lead to unauthorized configuration changes, disruption of power management, or further lateral movement within the network. The high impact on confidentiality, integrity, and availability means sensitive operational data could be exposed or manipulated, potentially causing operational downtime or safety risks. Given the local access requirement, the threat is more relevant to organizations with multiple users or less restrictive local access controls. European organizations with critical infrastructure or manufacturing plants using Intel Enpirion products are particularly at risk, as successful exploitation could disrupt production lines or critical services.

Mitigation Recommendations

1. Restrict local access to systems running the Intel Enpirion Digital Power Configurator GUI software to trusted personnel only, minimizing the risk of an attacker gaining the initial foothold. 2. Implement strict file system permissions and integrity monitoring on directories involved in the software's search path to prevent unauthorized file placement or modification. 3. Use application whitelisting and code signing enforcement to ensure only legitimate binaries and resources are loaded by the software. 4. Monitor logs and system behavior for unusual activity indicative of privilege escalation attempts. 5. If possible, isolate systems running this software from general user environments to reduce exposure. 6. Stay updated with Intel advisories and apply patches or updates promptly once available. 7. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 8. Employ endpoint detection and response (EDR) solutions capable of detecting suspicious local privilege escalation behaviors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2022-03-02T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdc10c

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 11:27:39 AM

Last updated: 7/30/2025, 10:14:46 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats