CVE-2025-20010
📋 TL;DR
This vulnerability in Intel Processor Identification Utility before version 8.0.43 allows local authenticated attackers to escalate privileges via unmaintained third-party components. It affects systems running the vulnerable utility, potentially compromising confidentiality, integrity, and availability. Attackers need local access but no special knowledge or user interaction.
💻 Affected Systems
- Intel Processor Identification Utility
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining SYSTEM/root privileges, allowing installation of persistent malware, data theft, and system destruction.
Likely Case
Local privilege escalation enabling attackers to bypass security controls, install unauthorized software, or access protected system resources.
If Mitigated
Limited impact with proper patch management and least privilege principles in place, though residual risk remains if utility is still present.
🎯 Exploit Status
Attack requires local authenticated access but no user interaction. Complexity is low as described in the CVE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.0.43 or later
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01334.html
Restart Required: Yes
Instructions:
1. Download Intel Processor Identification Utility version 8.0.43 or later from Intel's website. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.
🔧 Temporary Workarounds
Uninstall Utility
windowsRemove Intel Processor Identification Utility if not required for operations
Control Panel > Programs > Uninstall a program > Select Intel Processor Identification Utility > Uninstall
Restrict Access
windowsApply strict file permissions to prevent unauthorized users from accessing the utility
icacls "C:\Program Files\Intel\Processor Identification Utility\*" /deny Users:(RX)
🧯 If You Can't Patch
- Remove Intel Processor Identification Utility entirely if not needed
- Implement strict access controls and least privilege principles to limit who can execute the utility
🔍 How to Verify
Check if Vulnerable:
Check installed version of Intel Processor Identification Utility via Programs and Features (Windows) or package manager (Linux)
Check Version:
On Windows: Check via Control Panel > Programs > Intel Processor Identification Utility properties. On Linux: rpm -qa | grep -i intel-processor-identification or dpkg -l | grep -i intel-processor-identification
Verify Fix Applied:
Verify version is 8.0.43 or later and check that the utility functions correctly post-update
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Intel Processor Identification Utility executable
- Failed privilege escalation attempts in security logs
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
EventID=4688 AND ProcessName LIKE '%Intel Processor Identification Utility%' AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%'