Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22839: Escalation of Privilege in Intel(R) Xeon(R) 6 Scalable processors

0
High
VulnerabilityCVE-2025-22839cvecve-2025-22839
Published: Tue Aug 12 2025 (08/12/2025, 16:58:36 UTC)
Source: CVE Database V5
Product: Intel(R) Xeon(R) 6 Scalable processors

Description

Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:20:40 UTC

Technical Analysis

CVE-2025-22839 is a vulnerability identified in Intel Xeon 6 Scalable processors related to insufficient granularity in access control within the Out-Of-Band Management Subsystem (OOB-MSM). The OOB-MSM is responsible for managing hardware components independently of the main operating system, often used for remote management and monitoring. The flaw allows a privileged user—someone who already has elevated access—to potentially escalate their privileges further by exploiting adjacent access capabilities. This means that although the attacker must already have high privileges, they can leverage this vulnerability to gain even greater control over the system, potentially bypassing intended security boundaries. The vulnerability does not require user interaction, which increases its risk in environments where privileged accounts are accessible. The CVSS 4.0 base score of 7.3 reflects a high severity, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), and requiring privileges (PR:H) and partial attack type (AT:P). The impact on confidentiality, integrity, and availability is high, particularly confidentiality and integrity, while availability impact is low. No known exploits have been reported in the wild as of the publication date, but the potential for exploitation exists once attackers gain privileged access. The vulnerability affects specific versions of Intel Xeon 6 Scalable processors, commonly deployed in enterprise servers and data centers. Due to the critical role of these processors in cloud infrastructure and enterprise environments, exploitation could lead to unauthorized access to sensitive data or control over critical systems.

Potential Impact

For European organizations, the impact of CVE-2025-22839 can be significant, especially for enterprises relying on Intel Xeon 6 Scalable processors in their data centers, cloud services, and critical infrastructure. Successful exploitation could allow attackers with existing privileged access to escalate their privileges further, potentially leading to unauthorized data access, manipulation, or disruption of services. This could compromise confidentiality and integrity of sensitive information, including personal data protected under GDPR, intellectual property, and operational data. The vulnerability could also undermine trust in managed services and cloud providers using affected hardware. Given the high attack complexity and requirement for privileged access, the threat is more relevant to insider threats or attackers who have already breached perimeter defenses. However, once exploited, the consequences could be severe, including lateral movement within networks and persistence. The lack of current known exploits provides a window for proactive mitigation, but organizations must act swiftly to prevent future exploitation.

Mitigation Recommendations

1. Apply official patches and firmware updates from Intel as soon as they become available to address the access control granularity issue in the OOB-MSM. 2. Restrict and tightly control privileged user accounts, implementing the principle of least privilege to minimize the number of users with high-level access. 3. Implement robust monitoring and logging of privileged account activities to detect unusual or unauthorized privilege escalation attempts. 4. Employ network segmentation to limit adjacent access opportunities, isolating management subsystems from general network traffic where possible. 5. Use hardware-based security features such as Intel Trusted Execution Technology (TXT) and Intel Software Guard Extensions (SGX) to add layers of defense. 6. Conduct regular security audits and penetration testing focused on privilege escalation vectors within systems using affected processors. 7. Educate system administrators and security teams about the vulnerability and the importance of securing privileged access paths. 8. Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious privilege escalation behaviors. 9. Maintain an incident response plan that includes scenarios involving hardware-level privilege escalation to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-16T04:00:23.780Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7750ad5a09ad003492f6

Added to database: 8/12/2025, 5:18:08 PM

Last enriched: 11/3/2025, 6:20:40 PM

Last updated: 12/4/2025, 9:24:26 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats