CVE-2025-24848
BaseFortify
Publication date: 2025-11-11
Last updated on: 2026-04-29
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | computing_improvement_program | to 2.4.11001 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a protection mechanism failure in some Intel(R) CIP software versions before WIN_DCA_2.4.0.11001. It occurs within Ring 3 (user applications) and may allow an escalation of privilege. An unprivileged software adversary, combined with a privileged user and a high complexity attack, may exploit this vulnerability via local access with passive user interaction, potentially leading to increased privileges on the system.
How can this vulnerability impact me? :
The vulnerability can impact the confidentiality, integrity, and availability of the vulnerable system at a high level. This means an attacker could potentially gain unauthorized access, alter data, or disrupt system operations by escalating their privileges.