CVE-2025-25216
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-11

Last updated on: 2025-11-11

Assigner: Intel Corporation

Description
Improper input validation in some firmware for some Intel(R) Graphics Drivers and Intel LTS kernels within Ring 1: Device Drivers may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-11
Last Modified
2025-11-11
Generated
2026-05-06
AI Q&A
2025-11-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
intel linux_kernel *
intel graphics_drivers *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is due to improper input validation in certain Intel Graphics Drivers firmware and Intel LTS kernels within device drivers. It may allow an unprivileged, authenticated user to cause a denial of service (DoS) on the system. The attack requires local access, some special internal knowledge, and no user interaction. The impact is limited to availability, with no effect on confidentiality or integrity.


How can this vulnerability impact me? :

The vulnerability can lead to a denial of service condition, which means the affected system or device may become unavailable or unresponsive. This could disrupt normal operations but does not compromise data confidentiality or integrity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability primarily affects system availability and does not impact confidentiality or integrity of data. Therefore, it is unlikely to directly affect compliance with standards and regulations focused on data protection such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart