Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20043: Escalation of Privilege in Intel(R) RealSense™ SDK software

0
Medium
VulnerabilityCVE-2025-20043cvecve-2025-20043
Published: Tue May 13 2025 (05/13/2025, 21:01:51 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) RealSense™ SDK software

Description

Uncontrolled search path for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:35:39 UTC

Technical Analysis

CVE-2025-20043 is a vulnerability identified in Intel RealSense SDK software versions prior to 2.56.2. The issue arises from an uncontrolled search path mechanism within the SDK, which can be exploited by an authenticated user with local access to escalate their privileges on the affected system. The vulnerability requires the attacker to have at least low privileges and perform user interaction, making exploitation more complex. The uncontrolled search path means that the software may load malicious or unintended libraries or executables from directories that are not securely controlled, allowing privilege escalation. The vulnerability impacts confidentiality, integrity, and availability due to the potential for unauthorized access and control escalation. The CVSS 4.0 vector indicates local attack vector (AV:L), high attack complexity (AC:H), privileges required are low (PR:L), and user interaction is required (UI:P). The vulnerability does not affect system components remotely and is not known to be exploited in the wild as of the publication date. Intel has addressed this issue in version 2.56.2 of the RealSense SDK, and users are advised to upgrade to this or later versions to remediate the vulnerability.

Potential Impact

The vulnerability allows an authenticated local user to escalate privileges, potentially gaining higher-level access than intended. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system operations. In environments where Intel RealSense SDK is used for computer vision and sensing applications, such privilege escalation could compromise the integrity of the data collected or processed, impacting downstream applications and decision-making processes. The requirement for local access and user interaction limits the scope but does not eliminate risk, especially in multi-user systems or environments where users have limited privileges but access to sensitive systems. Organizations relying on Intel RealSense SDK in sectors such as manufacturing, robotics, healthcare, and security may face operational disruptions or data breaches if this vulnerability is exploited. The absence of known exploits reduces immediate risk but does not preclude future attacks.

Mitigation Recommendations

Organizations should upgrade Intel RealSense SDK to version 2.56.2 or later, where this vulnerability is patched. Until the update is applied, restrict local access to systems running vulnerable versions of the SDK to trusted users only. Implement strict file system permissions and monitor for unauthorized changes in directories used by the SDK to prevent malicious library injection. Employ application whitelisting to restrict execution of unauthorized binaries. Conduct regular audits of user privileges and remove unnecessary local accounts or privileges that could be leveraged for exploitation. Additionally, educate users about the risks of interacting with untrusted files or applications that could trigger the vulnerability. For environments where immediate patching is not feasible, consider isolating affected systems or running the SDK within controlled containers or virtual machines to limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-07T04:00:23.751Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0a5

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 2/26/2026, 8:35:39 PM

Last updated: 3/21/2026, 10:52:13 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses