CVE-2025-20010

Use of unmaintained third party components for some Intel(R) Processor Identification Utility before version 8.0.43 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Configurations

No configuration.

History

11 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-11 17:15

Updated : 2025-11-12 16:19


NVD link : CVE-2025-20010

Mitre link : CVE-2025-20010

CVE.ORG link : CVE-2025-20010


JSON object : View

Products Affected

No product.

CWE
CWE-1104

Use of Unmaintained Third Party Components