Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20027: Escalation of Privilege in Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

0
High
VulnerabilityCVE-2025-20027cvecve-2025-20027
Published: Tue Mar 10 2026 (03/10/2026, 22:49:15 UTC)
Source: CVE Database V5
Product: Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Description

Improper input validation in the UEFI WheaERST module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 03/10/2026, 23:14:50 UTC

Technical Analysis

CVE-2025-20027 is a vulnerability identified in the UEFI WheaERST module of certain Intel reference platforms. The root cause is improper input validation, which can be exploited by a system software adversary who already has privileged user access. The attack complexity is high, requiring local access but no user interaction or special internal knowledge, making it a sophisticated but feasible threat in certain environments. The vulnerability allows escalation of privilege, potentially enabling the attacker to gain higher system privileges than initially granted. This can compromise the confidentiality, integrity, and availability of the vulnerable system at a high level, although the impact does not extend beyond the compromised system itself. The vulnerability is scored 7.1 on the CVSS 4.0 scale, reflecting its high severity due to the combination of high impact and attack complexity. No public exploits have been observed yet, but the critical role of UEFI firmware in system initialization and security enforcement makes this a significant concern. The vulnerability affects Intel reference platforms, which serve as a baseline for many OEM implementations, suggesting a broad potential attack surface. The lack of user interaction and special knowledge requirements lowers the barrier for exploitation once local privileged access is obtained, emphasizing the need for strict access controls and timely patching.

Potential Impact

The vulnerability poses a high risk to organizations relying on Intel reference platforms, particularly those with sensitive or critical workloads. Successful exploitation can lead to unauthorized privilege escalation, allowing attackers to bypass security controls, manipulate system firmware settings, or install persistent malware at a low level. This can result in severe confidentiality breaches, data integrity violations, and system availability disruptions. Since UEFI operates before the OS loads, compromise here can undermine all higher-level security mechanisms, potentially enabling stealthy and persistent attacks. The impact is confined to the local system but can be devastating for critical infrastructure, enterprise servers, and endpoint devices. Organizations with complex IT environments and privileged user access are especially vulnerable, as the attack requires such access to initiate. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the potential damage.

Mitigation Recommendations

1. Apply official patches or firmware updates from Intel or OEM vendors as soon as they become available to address the input validation flaw in the UEFI WheaERST module. 2. Restrict privileged user access rigorously, enforcing the principle of least privilege to minimize the number of accounts capable of initiating such an attack. 3. Implement strong local access controls, including multi-factor authentication and session monitoring, to detect and prevent unauthorized privileged access. 4. Employ firmware integrity verification tools and secure boot mechanisms to detect unauthorized modifications to UEFI firmware. 5. Conduct regular audits of privileged accounts and system firmware versions to ensure compliance with security policies. 6. Use endpoint detection and response (EDR) solutions capable of monitoring firmware-level anomalies and privilege escalation attempts. 7. Educate system administrators about the risks of local privilege escalation and the importance of maintaining updated firmware. 8. Consider network segmentation and isolation of critical systems to limit the spread and impact of potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2024-10-10T03:00:11.194Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0a2672f860ef943daa9ec

Added to database: 3/10/2026, 10:59:51 PM

Last enriched: 3/10/2026, 11:14:50 PM

Last updated: 3/13/2026, 11:26:47 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses