Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20073: Information Disclosure in Intel(R) Reference Platforms

0
Low
VulnerabilityCVE-2025-20073cvecve-2025-20073
Published: Tue Mar 10 2026 (03/10/2026, 22:49:21 UTC)
Source: CVE Database V5
Product: Intel(R) Reference Platforms

Description

Improper buffer restrictions in the UEFI DXE module for some Intel(R) Reference Platforms within UEFI may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 23:15:40 UTC

Technical Analysis

CVE-2025-20073 is a vulnerability identified in the UEFI DXE (Driver Execution Environment) module used in some Intel Reference Platforms. The root cause is improper buffer restrictions within the UEFI firmware code, which can lead to information disclosure. Specifically, a system software adversary possessing privileged user access (e.g., administrator or root) could exploit this flaw to read sensitive data from memory buffers that should otherwise be protected. The attack complexity is high, requiring detailed internal knowledge of the platform and firmware, and it can only be performed locally without any user interaction. The vulnerability affects confidentiality at a low level, with no impact on system integrity or availability. Since the flaw exists in firmware, it could potentially expose sensitive platform or system information that might aid further attacks. However, exploitation is constrained by the need for privileged access and high complexity, limiting its practical risk. No public exploits or active attacks have been reported to date. The CVSS 4.0 base score is 1.8, reflecting the low severity and limited impact. The vulnerability is specific to Intel Reference Platforms, which are typically used as baseline designs for OEMs and system integrators, meaning the exposure depends on the adoption of these platforms in deployed systems.

Potential Impact

The potential impact of CVE-2025-20073 is primarily limited to confidentiality leakage of sensitive information within affected Intel Reference Platforms. Because exploitation requires privileged local access and high complexity, the risk to most organizations is low. However, in environments where attackers have already gained elevated privileges, this vulnerability could allow further data exposure that might facilitate lateral movement or privilege escalation attempts. There is no impact on system integrity or availability, so the threat does not directly enable system manipulation or denial of service. Organizations relying on Intel Reference Platforms in sensitive or high-security environments should be aware of this vulnerability as part of their firmware security posture. The impact is minimal for most end users and enterprises, but it could be more relevant in government, defense, or critical infrastructure sectors where firmware-level confidentiality is paramount.

Mitigation Recommendations

To mitigate CVE-2025-20073, organizations should monitor Intel and OEM advisories for firmware updates addressing this vulnerability and apply patches promptly once available. Since the vulnerability requires privileged local access, enforcing strict access controls and limiting administrative privileges reduces the attack surface. Employing robust endpoint security solutions to detect and prevent unauthorized privilege escalation attempts is also recommended. Firmware integrity verification and secure boot mechanisms can help ensure that only trusted firmware is executed, reducing the risk of exploitation. Additionally, organizations should conduct regular audits of privileged accounts and monitor for suspicious local activity that could indicate attempts to exploit firmware vulnerabilities. Collaboration with hardware vendors to confirm affected platform versions and patch availability is critical for timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2024-10-10T03:00:11.214Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0a2672f860ef943daa9f8

Added to database: 3/10/2026, 10:59:51 PM

Last enriched: 3/10/2026, 11:15:40 PM

Last updated: 4/23/2026, 9:04:43 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses