Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22444: Information Disclosure in Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

0
Medium
VulnerabilityCVE-2025-22444cvecve-2025-22444
Published: Tue Mar 10 2026 (03/10/2026, 22:49:25 UTC)
Source: CVE Database V5
Product: Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Description

CVE-2025-22444 is an information disclosure vulnerability affecting Intel reference platforms, specifically in the UEFI PdaSmm module. It allows a system software adversary with privileged user access to potentially expose sensitive data. Exploitation requires local access, high attack complexity, and no user interaction, but no special internal knowledge is needed. The vulnerability impacts confidentiality with no effect on integrity or availability. The CVSS 4. 0 base score is 5. 6, indicating a medium severity level. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability primarily threatens systems using affected Intel reference platforms, especially in environments where privileged local access is possible. Mitigation requires restricting privileged access and monitoring for suspicious local activity.

AI-Powered Analysis

AILast updated: 03/10/2026, 23:15:29 UTC

Technical Analysis

CVE-2025-22444 is a medium-severity information disclosure vulnerability identified in Intel reference platforms, specifically within the UEFI PdaSmm (Pre-boot Driver System Management Mode) module. The flaw arises from improper exposure of resources to an incorrect security domain ('wrong sphere'), which can lead to unauthorized data exposure. Exploitation requires a system software adversary possessing privileged user rights on the local machine, combined with a high complexity attack vector. Notably, the attack does not require user interaction or special internal knowledge, but it cannot be executed remotely. The vulnerability impacts confidentiality significantly, as sensitive information may be leaked, but it does not affect system integrity or availability. The CVSS 4.0 vector (AV:L/AC:H/PR:H/UI:N/VC:H/VI:N/VA:N) reflects local attack vector, high attack complexity, and the need for high privileges, resulting in a base score of 5.6 (medium severity). No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation relies on limiting privileged access and monitoring. This vulnerability is particularly relevant for organizations deploying Intel reference platforms in environments where local privileged access could be compromised, such as development labs, testing environments, or insider threat scenarios.

Potential Impact

The primary impact of CVE-2025-22444 is the unauthorized disclosure of sensitive information from affected Intel reference platforms. Confidentiality is rated as high impact because the vulnerability allows privileged local attackers to access data that should remain protected. However, there is no impact on system integrity or availability, meaning the vulnerability does not enable data manipulation or service disruption. Organizations with affected systems could face risks such as leakage of proprietary information, credentials, or other sensitive data stored or processed in the vulnerable UEFI module. Since exploitation requires privileged local access and a high complexity attack, the threat is more relevant in environments where insider threats or compromised administrative accounts exist. The absence of remote exploitation capability limits the attack surface but does not eliminate risk in multi-user or shared environments. Overall, the vulnerability could facilitate further attacks if sensitive data is disclosed, but immediate operational disruption is unlikely.

Mitigation Recommendations

1. Restrict privileged local access strictly to trusted personnel and systems to reduce the risk of exploitation. 2. Implement robust monitoring and auditing of privileged user activities to detect suspicious behavior indicative of attempts to exploit this vulnerability. 3. Apply principle of least privilege to system software and administrative accounts to minimize exposure. 4. Stay informed on Intel advisories and promptly apply firmware or UEFI updates once patches addressing CVE-2025-22444 are released. 5. Employ hardware-based security features such as Intel Trusted Execution Technology (TXT) or Platform Trust Technology (PTT) to enhance platform integrity. 6. Conduct regular security assessments of UEFI and firmware components to identify and remediate potential weaknesses. 7. In environments where local privileged access cannot be fully controlled, consider additional endpoint protection measures to detect and prevent exploitation attempts. 8. Educate system administrators and security teams about the vulnerability to ensure awareness and readiness to respond.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-01-08T04:00:28.826Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0a2672f860ef943daa9fe

Added to database: 3/10/2026, 10:59:51 PM

Last enriched: 3/10/2026, 11:15:29 PM

Last updated: 3/11/2026, 1:26:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses