CVE-2025-20096
Improper input validation in the UEFI firmware for some Intel Reference Platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts.
| CWE | CWE-20 |
| Vendor | n/a |
| Product | intel reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts. |
| Published | Mar 10, 2026 |
| Last Updated | Mar 12, 2026 |
Get instant alerts for n/a intel reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts.
Be the first to know when new unknown vulnerabilities affecting n/a intel reference platforms may allow an escalation of privilege. system software adversary with a privileged user combined with a high complexity attack may enable data manipulation. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. the potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts. are published โ delivered to Slack, Telegram or Discord.