Use of unmaintained third party components for some Intel(R) Processor Identification Utility before version 8.0.43 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
References
Configurations
No configuration.
History
11 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-11 17:15
Updated : 2025-11-12 16:19
NVD link : CVE-2025-20010
Mitre link : CVE-2025-20010
CVE.ORG link : CVE-2025-20010
JSON object : View
Products Affected
No product.
CWE
CWE-1104
Use of Unmaintained Third Party Components
