CVE-2025-20003 – Intel Graphics Driver Link Following Privilege Escalation Vulnerability

The following table lists the changes that have been made to the
CVE-2025-20003 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 13, 2025

    Action Type Old Value New Value
    Added Description Improper link resolution before file access (‘Link Following’) for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access.
    Added CVSS V4.0 AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
    Added CWE CWE-59
    Added Reference https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html
Share the Post:

Related Posts