CVE-2025-36511
Incorrect Default Permissions in Intel Memory Tool Allow Privilege Escalation
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | memory_and_storage_tool | to 2.5.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-276 | During installation, installed file permissions are set to allow anyone to modify those files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves incorrect default permissions in some versions of the Intel(R) Memory and Storage Tool before version 2.5.2. It exists within Ring 3, which is the user application level, and may allow an escalation of privilege.
An attacker who is a system software adversary with an authenticated user account, combined with a high complexity attack and active user interaction, may exploit this vulnerability locally to gain higher privileges than intended.
How can this vulnerability impact me? :
This vulnerability can impact the confidentiality, integrity, and availability of the vulnerable system at a high level.
Specifically, it may allow an attacker to escalate privileges, potentially leading to unauthorized access or modification of sensitive data and disruption of system operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know