Improper input validation in some UEFI firmware SMM module for the Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
History

Tue, 10 Mar 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper input validation in some UEFI firmware SMM module for the Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-03-10T22:49:23.987Z

Reserved: 2024-10-10T03:00:11.103Z

Link: CVE-2025-20105

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-10T23:16:42.593

Modified: 2026-03-10T23:16:42.593

Link: CVE-2025-20105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.