Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35998: Escalation of Privilege in Intel(R) Platforms

0
High
VulnerabilityCVE-2025-35998cvecve-2025-35998
Published: Tue Feb 10 2026 (02/10/2026, 16:26:00 UTC)
Source: CVE Database V5
Product: Intel(R) Platforms

Description

Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within Ring 0: Kernel may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 16:45:35 UTC

Technical Analysis

CVE-2025-35998 is a vulnerability identified in Intel platforms that utilize Intel Quick Assist Technology (QAT), a hardware acceleration technology designed to offload cryptographic and compression workloads. The root cause is a missing protection mechanism for an alternate hardware interface accessible within the kernel's Ring 0, which governs the highest privilege level in the system. This flaw allows a system software adversary who already has privileged user access (e.g., administrator or root) and possesses some special internal knowledge about the hardware interface to perform an escalation of privilege attack. The attack vector is local, requiring no user interaction, and has low complexity, meaning it does not require sophisticated exploitation techniques. The vulnerability impacts confidentiality and integrity of the system by potentially allowing unauthorized access or modification of sensitive data or system components. However, it does not affect system availability. The CVSS 4.0 score of 7 (high) reflects the significant impact on confidentiality and integrity combined with the requirement for privileged access and local attack vector. No patches or exploits are currently publicly available, but the vulnerability is officially published and tracked. The lack of user interaction and low complexity increases the risk in environments where privileged access is not tightly controlled. Intel Quick Assist Technology is commonly found in enterprise-grade servers and networking equipment, making this vulnerability relevant to data centers and cloud providers.

Potential Impact

For European organizations, the impact of CVE-2025-35998 can be substantial, especially for those relying on Intel-based servers and networking devices that incorporate Intel Quick Assist Technology. The vulnerability allows an attacker with existing privileged access to escalate their privileges further, potentially gaining full control over the system kernel. This can lead to unauthorized disclosure or modification of sensitive data, undermining confidentiality and integrity. Critical infrastructure, financial institutions, and government agencies in Europe that depend on Intel platforms for secure data processing could face increased risk of insider threats or lateral movement by attackers who have compromised privileged accounts. Although availability is not directly impacted, the breach of confidentiality and integrity can lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial consequences. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released or reverse-engineered.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Intel’s security advisories closely and apply patches or firmware updates for Intel Quick Assist Technology as soon as they become available. 2) Restrict and audit privileged user access rigorously to minimize the number of accounts that can exploit this vulnerability. 3) Employ hardware and software-based access controls to limit local access to critical systems, including physical security measures and network segmentation to reduce attack surface. 4) Use endpoint detection and response (EDR) tools to monitor for unusual privilege escalation activities or kernel-level anomalies. 5) Conduct regular security training for system administrators to recognize and prevent misuse of privileged accounts. 6) Consider disabling Intel Quick Assist Technology features if not required or if a patch is unavailable, after evaluating operational impact. 7) Implement strict change management and logging to detect unauthorized modifications to kernel-level components. These steps go beyond generic advice by focusing on controlling privileged access and monitoring kernel-level activities specific to this vulnerability’s exploitation path.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:18:44.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5f4b57a58fa119cfb0

Added to database: 2/10/2026, 4:31:27 PM

Last enriched: 2/10/2026, 4:45:35 PM

Last updated: 2/21/2026, 12:22:08 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats