Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21099: Escalation of Privilege in Intel(R) Graphics software

0
Medium
VulnerabilityCVE-2025-21099cvecve-2025-21099
Published: Tue May 13 2025 (05/13/2025, 21:02:33 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Graphics software

Description

Uncontrolled search path for some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:48:16 UTC

Technical Analysis

CVE-2025-21099 is a vulnerability identified in Intel(R) Graphics software involving an uncontrolled search path. This type of vulnerability occurs when software loads resources such as DLLs or other components from directories that are not securely specified, allowing an attacker with local access to influence which files are loaded. In this case, an authenticated user with limited privileges (PR:L) can exploit the flaw to escalate their privileges on the system. The vulnerability requires user interaction (UI:A) and has a high attack complexity (AC:H), indicating that exploitation is not straightforward and may require specific conditions or knowledge. The CVSS 4.0 vector indicates the attack is local (AV:L), requires privileges (PR:L), and user interaction, with high impact on confidentiality, integrity, and availability (all rated high). No known public exploits exist yet, and Intel has not published patches at the time of this report. The vulnerability affects certain versions of Intel Graphics software, which is widely deployed on systems using Intel integrated graphics solutions. The uncontrolled search path could allow an attacker to load malicious components, thereby gaining elevated privileges and potentially compromising the system's security posture.

Potential Impact

If successfully exploited, this vulnerability could allow a local authenticated user to escalate privileges beyond their current level, potentially gaining administrative or system-level access. This could lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of system operations. The impact spans confidentiality, integrity, and availability, as elevated privileges could be leveraged to bypass security controls and compromise system stability. However, the requirement for local access and user interaction limits the scope to environments where attackers have some foothold. Organizations with many users having local access or shared workstations are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially once exploit code becomes available. The vulnerability could be leveraged in targeted attacks against high-value systems using Intel Graphics software.

Mitigation Recommendations

Organizations should implement strict local access controls to limit the number of users with authenticated local access, reducing the attack surface. Employ the principle of least privilege to ensure users operate with minimal necessary rights. Monitor for and apply security updates from Intel promptly once patches for this vulnerability are released. Until patches are available, consider restricting or monitoring the use of affected Intel Graphics software components, especially on critical systems. Employ application whitelisting and integrity monitoring to detect unauthorized changes to software components or libraries. Conduct regular audits of local user permissions and system configurations to identify potential exploitation paths. Educate users about the risks of interacting with untrusted software or files that could trigger exploitation. Use endpoint detection and response (EDR) tools to identify suspicious local privilege escalation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-08T04:00:28.808Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec7b3

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:48:16 PM

Last updated: 3/23/2026, 3:52:14 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses