CVE-2025-22839

7.5 HIGH

📋 TL;DR

This vulnerability allows a privileged user on affected Intel Xeon 6 Scalable processors to potentially escalate privileges via adjacent access due to insufficient access control granularity in the OOB-MSM (Out-of-Band Management Subsystem Module). This affects systems running these specific Intel server processors, particularly in multi-tenant or shared hosting environments where privilege separation is critical.

💻 Affected Systems

Products:
  • Intel Xeon 6 Scalable processors with OOB-MSM
Versions: Specific stepping/versions not publicly detailed; refer to Intel advisory for exact affected models
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is hardware/firmware based, so OS-independent. Requires physical or adjacent access to the management subsystem.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious privileged user could gain full system control, access other tenants' data in cloud environments, or compromise the entire physical server infrastructure.

🟠

Likely Case

Privileged users (like system administrators or cloud tenants with elevated access) could bypass intended security boundaries to access restricted resources or perform unauthorized actions.

🟢

If Mitigated

With proper access controls, network segmentation, and least-privilege principles, the impact would be limited to the compromised user's scope, preventing lateral movement or system-wide compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires privileged access to the OOB management interface and adjacent access capabilities. No public exploits available as of advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microcode/firmware updates from Intel; check specific processor model for exact version

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html

Restart Required: Yes

Instructions:

1. Check Intel advisory for affected processor models. 2. Obtain microcode/firmware update from system manufacturer (OEM). 3. Apply firmware update through system management interface (BMC/iDRAC/iLO). 4. Reboot system to activate new microcode.

🔧 Temporary Workarounds

Restrict OOB Management Access

all

Limit access to out-of-band management interfaces to only authorized administrators using network segmentation and strict access controls.

Implement Least Privilege

all

Ensure users only have minimum necessary privileges; regularly audit privileged accounts and access to management interfaces.

🧯 If You Can't Patch

  • Isolate affected systems in dedicated network segments with strict access controls
  • Monitor OOB management interface logs for suspicious activity and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check processor model and microcode version via: cat /proc/cpuinfo | grep 'model name' and 'microcode' on Linux, or systeminfo on Windows. Compare against Intel's affected processor list.

Check Version:

Linux: cat /proc/cpuinfo | grep -E 'model name|microcode'; Windows: wmic cpu get name,description,processorid

Verify Fix Applied:

Verify microcode version after update matches patched version from Intel/OEM documentation. Use same commands as checking vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual OOB management interface access patterns
  • Privilege escalation attempts in system logs
  • Unexpected firmware/microcode modification attempts

Network Indicators:

  • Unauthorized access to management network segments
  • Suspicious traffic to BMC/iDRAC/iLO interfaces

SIEM Query:

source="*management*" OR source="*BMC*" OR source="*iDRAC*" OR source="*iLO*" AND (action="privilege*" OR action="escalate*")

🔗 References

📤 Share & Export