Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27711: Escalation of Privilege in Intel(R) One Boot Flash Update (Intel(R) OFU) software

0
Medium
VulnerabilityCVE-2025-27711cvecve-2025-27711
Published: Tue Nov 11 2025 (11/11/2025, 16:50:24 UTC)
Source: CVE Database V5
Product: Intel(R) One Boot Flash Update (Intel(R) OFU) software

Description

Incorrect default permissions for some Intel(R) One Boot Flash Update (Intel(R) OFU) software before version 14.1.31 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:44:33 UTC

Technical Analysis

CVE-2025-27711 is an escalation of privilege vulnerability found in Intel One Boot Flash Update (OFU) software versions before 14.1.31. The root cause is incorrect default permissions assigned to certain components of the OFU software operating in Ring 3 (user space), which can be exploited by an unprivileged but authenticated local user. The attack requires active user interaction and is considered high complexity, meaning it is not trivial to exploit and may require specific conditions or user actions. The vulnerability allows an adversary to elevate their privileges on the affected system, potentially gaining higher-level access than intended. This can lead to compromise of system confidentiality, integrity, and availability. The CVSS 4.0 vector indicates a local attack vector (AV:L), high attack complexity (AC:H), privileges required are low (PR:L), and user interaction is required (UI:A). The impact on confidentiality, integrity, and availability is rated high (C:H, I:H, A:H). No special internal knowledge is needed, but the attacker must be authenticated locally and induce user interaction. The vulnerability does not currently have known exploits in the wild, but the risk remains for environments running vulnerable OFU versions. Intel OFU software is used for firmware update processes on Intel platforms, making this vulnerability relevant for systems relying on Intel hardware and firmware management tools. The vulnerability was published on November 11, 2025, and affects all versions prior to 14.1.31.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Intel hardware with the OFU software prior to version 14.1.31. Successful exploitation could allow a local authenticated user to escalate privileges, potentially leading to unauthorized access to sensitive data, modification of system firmware or software, and disruption of system availability. This could impact critical infrastructure, enterprise IT environments, and any systems relying on Intel firmware update mechanisms. The confidentiality, integrity, and availability of affected systems could be severely compromised, potentially leading to data breaches, system downtime, or persistent malware installation. Given the local and authenticated nature of the attack, insider threats or compromised user accounts pose a particular risk. The medium severity rating suggests that while exploitation is not trivial, the consequences of a successful attack could be significant. Organizations in sectors such as finance, government, telecommunications, and manufacturing, which often use Intel platforms extensively, should be particularly vigilant. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should prioritize upgrading Intel One Boot Flash Update software to version 14.1.31 or later to remediate the incorrect default permissions vulnerability. In environments where immediate patching is not feasible, restrict local user access to systems running vulnerable OFU versions and enforce strict user privilege management to minimize the risk of privilege escalation. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or suspicious user activity. Conduct regular audits of user permissions and system configurations to ensure no unauthorized changes have been made. Educate users about the risks of interacting with untrusted software or prompts that could trigger the vulnerability. Employ application whitelisting to prevent unauthorized execution of potentially malicious code. Additionally, consider network segmentation to limit the ability of compromised users to move laterally within the network. Maintain up-to-date backups and incident response plans to quickly recover from any potential compromise. Coordinate with Intel for any additional advisories or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-04T03:00:34.483Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b7112d2ca32afccdb3a

Added to database: 11/11/2025, 4:59:29 PM

Last enriched: 11/18/2025, 5:44:33 PM

Last updated: 11/22/2025, 3:18:01 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats