Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26470: Escalation of Privilege in Intel(R) Distribution for Python software installers

0
Medium
VulnerabilityCVE-2025-26470cvecve-2025-26470
Published: Tue Aug 12 2025 (08/12/2025, 16:59:20 UTC)
Source: CVE Database V5
Product: Intel(R) Distribution for Python software installers

Description

Incorrect default permissions for some Intel(R) Distribution for Python software installers before version 2025.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:19:56 UTC

Technical Analysis

CVE-2025-26470 is a vulnerability identified in Intel(R) Distribution for Python software installers prior to version 2025.1.0. The root cause is incorrect default permissions set on certain installer components, which can be exploited by an authenticated user with local access to escalate their privileges on the affected system. The vulnerability does not require remote access but does require the attacker to have some level of authenticated local access and user interaction, making exploitation more complex. The CVSS 4.0 vector indicates a local attack vector (AV:L), high attack complexity (AC:H), partial privileges required (PR:L), and user interaction (UI:A). The impact on confidentiality, integrity, and availability is rated high, meaning successful exploitation could lead to significant compromise of system security. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and patched in version 2025.1.0 of the Intel Distribution for Python installers. This distribution is commonly used in enterprise and scientific computing environments where Intel-optimized Python packages are preferred. The vulnerability could allow an attacker to gain elevated privileges, potentially leading to unauthorized access to sensitive data or system control. The issue stems from insecure file permissions that could be modified or leveraged by a local attacker to escalate privileges beyond their intended scope.

Potential Impact

The vulnerability poses a moderate risk to organizations using affected versions of Intel Distribution for Python installers. Successful exploitation could allow an authenticated local user to escalate privileges, potentially gaining administrative or root-level access. This could lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of services. Since the attack requires local access and user interaction, the threat is more relevant in environments where multiple users share systems or where attackers can gain initial foothold through other means. Organizations with development, research, or production environments relying on Intel-optimized Python distributions are at risk. The impact extends to confidentiality, integrity, and availability of affected systems, potentially compromising enterprise operations, intellectual property, and data privacy. Although no exploits are currently known in the wild, the public disclosure increases the risk of future exploitation attempts, especially in targeted attacks against organizations using Intel's Python distribution.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Intel Distribution for Python installers to version 2025.1.0 or later, where the permission issues have been corrected. Until patching is possible, administrators should audit and manually correct file and directory permissions associated with the installer to ensure they do not allow unauthorized modification or execution by low-privileged users. Implement strict access controls on systems where Intel Python distributions are installed, limiting local user privileges and restricting who can execute or modify installer files. Employ endpoint protection solutions that monitor for unusual privilege escalation attempts. Additionally, enforce the principle of least privilege for all users and services, and segment systems to reduce the risk of lateral movement if an attacker gains local access. Regularly review system logs for signs of privilege escalation attempts and educate users about the risks of executing untrusted code or installers. Finally, maintain an up-to-date inventory of software versions to quickly identify and remediate vulnerable installations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-03-06T04:00:37.834Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad00349365

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 2/27/2026, 1:19:56 AM

Last updated: 3/26/2026, 8:56:59 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses