Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27246: Escalation of Privilege in Intel(R) Processor Identification Utility

0
Medium
VulnerabilityCVE-2025-27246cvecve-2025-27246
Published: Tue Nov 11 2025 (11/11/2025, 16:50:19 UTC)
Source: CVE Database V5
Product: Intel(R) Processor Identification Utility

Description

Incorrect default permissions for the Intel(R) Processor Identification Utility before version 8.0.43 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a high complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:14:23 UTC

Technical Analysis

CVE-2025-27246 is a vulnerability identified in the Intel(R) Processor Identification Utility prior to version 8.0.43. The root cause is incorrect default permissions set within the utility running in Ring 3 (user mode), which can allow an authenticated local user to escalate privileges. The vulnerability requires local access and active user interaction, and the attack complexity is high, indicating that exploitation is non-trivial and likely requires detailed knowledge and effort. The vulnerability can lead to local code execution with elevated privileges, potentially compromising the confidentiality, integrity, and availability of the utility itself at a high level. However, the description notes that subsequent system-wide impacts on confidentiality, integrity, and availability are not expected. The CVSS 4.0 base score is 5.4 (medium severity), reflecting the limited attack vector (local), high complexity, and requirement for user interaction. No known exploits have been reported in the wild, and no patches are explicitly linked, but upgrading to version 8.0.43 or later is implied as a fix. The vulnerability is relevant for environments where the Intel Processor Identification Utility is installed and used, typically on systems with Intel processors for hardware identification and diagnostics.

Potential Impact

For European organizations, the primary impact is the potential for local privilege escalation on endpoints where the vulnerable Intel utility is installed. This could allow an authenticated user with limited privileges to gain elevated rights, potentially leading to unauthorized access to sensitive information or the ability to alter system configurations. While the vulnerability does not directly compromise system-wide confidentiality, integrity, or availability, it could serve as a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations. Organizations with strict endpoint security policies and limited local user privileges may reduce risk, but environments with shared workstations or less controlled local access are more vulnerable. The impact is particularly relevant for enterprises relying on Intel hardware diagnostics and management tools, including IT departments and managed service providers. Given the high complexity and requirement for user interaction, the threat is less likely to be exploited by opportunistic attackers but remains a concern for targeted attacks or insider threats.

Mitigation Recommendations

1. Upgrade the Intel(R) Processor Identification Utility to version 8.0.43 or later as soon as possible to ensure the vulnerability is patched. 2. Restrict local user permissions rigorously, ensuring that only trusted users have authenticated access to systems running the utility. 3. Implement strict endpoint security controls, including application whitelisting and monitoring for unusual privilege escalation attempts. 4. Educate users about the risks of executing untrusted code or interacting with suspicious prompts that could trigger the vulnerability. 5. Regularly audit system permissions and configurations to detect and remediate incorrect default permissions or privilege escalations. 6. Employ endpoint detection and response (EDR) solutions capable of identifying anomalous local privilege escalation behaviors. 7. Limit the installation of the Intel Processor Identification Utility to only necessary systems and users to reduce the attack surface. 8. Maintain up-to-date system and security patches beyond this utility to prevent chained exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-03-11T03:00:20.635Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b7012d2ca32afccdb21

Added to database: 11/11/2025, 4:59:28 PM

Last enriched: 11/18/2025, 5:14:23 PM

Last updated: 11/22/2025, 3:17:54 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats