CVE-2025-20005
Improper buffer restrictions in some UEFI firmware for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
| CWE | CWE-119 |
| Vendor | n/a |
| Product | intel(r) reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
| Published | Mar 10, 2026 |
| Last Updated | Mar 12, 2026 |
Get instant alerts for n/a intel(r) reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Be the first to know when new unknown vulnerabilities affecting n/a intel(r) reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. are published โ delivered to Slack, Telegram or Discord.