Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35998: Escalation of Privilege in Intel(R) Platforms

0
High
VulnerabilityCVE-2025-35998cvecve-2025-35998
Published: Tue Feb 10 2026 (02/10/2026, 16:26:00 UTC)
Source: CVE Database V5
Product: Intel(R) Platforms

Description

Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within Ring 0: Kernel may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:21:24 UTC

Technical Analysis

CVE-2025-35998 is a vulnerability identified in Intel Quick Assist Technology on certain Intel platforms, where a missing protection mechanism in an alternate hardware interface operating at Ring 0 (kernel mode) allows escalation of privilege. This flaw permits a system software adversary who already has privileged user access to leverage low complexity attacks combined with special internal knowledge to gain higher privileges, potentially compromising system confidentiality and integrity. The attack vector is local, requiring no user interaction, and no network access is needed. The vulnerability does not affect system availability directly. The CVSS 4.0 vector indicates low attack complexity (AC:L), requires privileged access (PR:H), no user interaction (UI:N), and results in high confidentiality and integrity impacts (VC:H, VI:H). The vulnerability was reserved in April 2025 and published in February 2026, with no known exploits in the wild yet. The affected versions are not explicitly listed but pertain to Intel platforms using Quick Assist Technology. The absence of patch links suggests that mitigations or patches may still be forthcoming or need to be obtained from Intel advisories. This vulnerability is critical for environments relying on Intel hardware acceleration for cryptographic or compression tasks, as it could allow attackers to bypass kernel protections and compromise sensitive data or system integrity.

Potential Impact

The vulnerability allows an attacker with existing privileged user access to escalate their privileges further, potentially gaining full kernel-level control. This can lead to unauthorized access to sensitive information, modification of critical system components, and undermining of system integrity. Although availability is not directly impacted, the confidentiality and integrity breaches can facilitate further attacks, such as data exfiltration, installation of persistent malware, or disabling security controls. Organizations relying on Intel Quick Assist Technology for cryptographic acceleration or data processing are at particular risk. The local attack requirement limits remote exploitation but insider threats or compromised privileged accounts could exploit this vulnerability. The high CVSS score reflects the significant risk posed by this vulnerability to enterprise and cloud environments where Intel platforms are prevalent.

Mitigation Recommendations

Organizations should monitor Intel security advisories closely for patches addressing CVE-2025-35998 and apply them promptly once available. Until patches are released, restrict local privileged user access to trusted personnel only and implement strict access controls and monitoring on systems using Intel Quick Assist Technology. Employ kernel-level integrity monitoring and audit logs to detect suspicious privilege escalations. Consider disabling Intel Quick Assist features if not required or isolating affected systems in secure network segments. Conduct regular privileged account reviews and enforce least privilege principles to reduce the risk of exploitation. Additionally, coordinate with hardware and software vendors to ensure comprehensive mitigation strategies are in place and test updates in controlled environments before deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:18:44.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5f4b57a58fa119cfb0

Added to database: 2/10/2026, 4:31:27 PM

Last enriched: 2/27/2026, 7:21:24 AM

Last updated: 4/6/2026, 6:36:30 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses