CVE-2025-32092
Insecure Permissions in Intel Graphics Software Allow Privilege Escalation
Publication date: 2026-02-10
Last updated on: 2026-04-20
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | graphics_driver | to 32.0.101.7026 (exc) |
| intel | graphics_driver | to 32.0.101.6979 (exc) |
| intel | graphics_software | to 25.30.1702.0 (exc) |
| intel | linux_intel_lts_kernel | to 6.12.28-linux-250521T070434Z (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-277 | A product defines a set of insecure permissions that are inherited by objects that are created by the program. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Can you explain this vulnerability to me?
This vulnerability involves insecure inherited permissions in certain versions of Intel(R) Graphics Software before 25.30.1702.0. It exists within Ring 3, which is the user application level. An unprivileged software adversary who is an authenticated user can potentially escalate their privileges by exploiting this issue. The attack requires local access, has high complexity, and needs active user interaction. No special internal knowledge is required to carry out the attack.
How can this vulnerability impact me? :
The vulnerability may impact the confidentiality, integrity, and availability of the vulnerable system at a high level. This means an attacker could potentially gain unauthorized access, modify data, or disrupt system operations by escalating their privileges through this flaw.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know