Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24327: Escalation of Privilege in Intel(R) Rapid Storage Technology Application

0
Medium
VulnerabilityCVE-2025-24327cvecve-2025-24327
Published: Tue Nov 11 2025 (11/11/2025, 16:49:45 UTC)
Source: CVE Database V5
Product: Intel(R) Rapid Storage Technology Application

Description

Insecure inherited permissions for some Intel(R) Rapid Storage Technology Application before version 20.0.1021 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:56:48 UTC

Technical Analysis

CVE-2025-24327 is a vulnerability identified in Intel Rapid Storage Technology (RST) Application versions prior to 20.0.1021. The flaw arises from insecure inherited permissions within the application operating in Ring 3 (user space), which can be exploited by an unprivileged but authenticated local user. The vulnerability allows escalation of privilege through local code execution, contingent on a high complexity attack vector that requires active user interaction. The attack does not require special internal knowledge but does require the attacker to have local access and the victim to perform some action. The vulnerability affects confidentiality, integrity, and availability of the system at a high level, although the initial impact on system confidentiality, integrity, and availability is noted as none, indicating the escalation is a prerequisite for further impact. The CVSS 4.0 vector indicates the attack vector is local (AV:L), with high attack complexity (AC:H), requiring privileges (PR:L) and user interaction (UI:A). The vulnerability is not known to be exploited in the wild as of publication. The insecure permissions likely allow the attacker to execute code with elevated privileges, potentially compromising the system or bypassing security controls. Intel RST is widely used for managing storage devices and RAID configurations on Intel-based systems, making this vulnerability relevant for many enterprise and consumer environments.

Potential Impact

The potential impact of CVE-2025-24327 is significant for organizations relying on Intel Rapid Storage Technology for storage management. Successful exploitation could allow an authenticated local user to escalate privileges, potentially leading to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of storage services. This could compromise system confidentiality, integrity, and availability, affecting business operations and data security. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where multiple users share systems or where attackers have gained limited access. In enterprise settings, this could facilitate lateral movement or privilege escalation within networks, increasing the risk of broader compromise. The absence of known exploits in the wild suggests limited current risk, but the medium CVSS score and high impact potential warrant proactive mitigation. Organizations with Intel RST deployed on critical infrastructure or sensitive environments should consider this vulnerability a moderate threat that could be leveraged in targeted attacks.

Mitigation Recommendations

To mitigate CVE-2025-24327, organizations should promptly update Intel Rapid Storage Technology Application to version 20.0.1021 or later where the vulnerability is addressed. Until patching is possible, restrict local user permissions to minimize the number of authenticated users who can access systems running vulnerable versions. Implement strict access controls and monitoring on systems with Intel RST installed, especially those shared among multiple users. Employ endpoint detection and response (EDR) solutions to detect suspicious local privilege escalation attempts. Educate users about the risks of interacting with untrusted software or executing unknown files, as active user interaction is required for exploitation. Consider isolating critical systems or limiting local administrative privileges to reduce the attack surface. Regularly audit installed software versions and permissions to ensure compliance with security policies. Finally, maintain up-to-date backups to recover from potential availability impacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-03-27T03:00:26.189Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b6f12d2ca32afccda30

Added to database: 11/11/2025, 4:59:27 PM

Last enriched: 2/27/2026, 4:56:48 AM

Last updated: 3/25/2026, 1:41:49 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses