Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20010: Escalation of Privilege in Intel(R) Processor Identification Utility

0
High
VulnerabilityCVE-2025-20010cvecve-2025-20010
Published: Tue Nov 11 2025 (11/11/2025, 16:49:22 UTC)
Source: CVE Database V5
Product: Intel(R) Processor Identification Utility

Description

Use of unmaintained third party components for some Intel(R) Processor Identification Utility before version 8.0.43 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:49:16 UTC

Technical Analysis

CVE-2025-20010 is a vulnerability identified in Intel(R) Processor Identification Utility versions prior to 8.0.43. The root cause is the use of unmaintained third-party components within the utility operating in Ring 3 (user application space). This architectural placement allows a local attacker, who is already authenticated on the system, to exploit the vulnerability with low attack complexity and no need for user interaction. The exploitation path does not require special internal knowledge and can be performed via local access, which means the attacker must have some level of access to the system but can escalate privileges from that point. The vulnerability affects confidentiality, integrity, and availability at a high level within the vulnerable system, potentially allowing the attacker to gain elevated privileges and perform unauthorized actions. The CVSS v4.0 score is 8.5, reflecting the high impact and relatively low complexity of exploitation. The vulnerability does not require user interaction and does not affect system components beyond the local scope. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of using unmaintained third-party components in security-sensitive utilities. Intel has addressed this issue in version 8.0.43 of the Processor Identification Utility, and users are advised to upgrade to this or later versions to mitigate the risk.

Potential Impact

The primary impact of CVE-2025-20010 is local privilege escalation, which can allow an authenticated user with limited permissions to gain higher privileges on the affected system. This can lead to unauthorized access to sensitive information (confidentiality), unauthorized modification or destruction of data (integrity), and disruption of system operations (availability). Since the utility runs on Intel-based systems, any organization using this utility on workstations, servers, or other devices could be at risk. The escalation of privilege can serve as a stepping stone for further attacks, including lateral movement, installation of persistent malware, or full system compromise. Although no exploits are currently known in the wild, the low complexity and lack of user interaction required make it a significant threat if weaponized. The vulnerability is particularly critical in environments with multiple users or where local access is possible, such as shared workstations, enterprise networks, or cloud environments with Intel hardware. Failure to patch could expose organizations to insider threats or attackers who have gained initial footholds through other means.

Mitigation Recommendations

1. Immediately upgrade the Intel(R) Processor Identification Utility to version 8.0.43 or later, where the vulnerability is addressed. 2. Implement strict access controls to limit local user access to systems running the vulnerable utility, reducing the risk of exploitation. 3. Monitor local user activities and audit logs for unusual privilege escalation attempts or suspicious behavior. 4. Employ endpoint detection and response (EDR) solutions that can detect abnormal process behaviors indicative of privilege escalation. 5. Restrict installation and execution of untrusted third-party software components to minimize the attack surface. 6. Conduct regular vulnerability assessments and patch management to ensure all system utilities and components are up to date. 7. Educate system administrators and users about the risks of local privilege escalation and the importance of applying security updates promptly. 8. Consider application whitelisting to prevent unauthorized execution of vulnerable utility versions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-01-06T23:39:39.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b6e12d2ca32afccd9fc

Added to database: 11/11/2025, 4:59:26 PM

Last enriched: 2/27/2026, 4:49:16 AM

Last updated: 3/22/2026, 9:56:22 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses