CVE-2025-36522
Incorrect Default Permissions in Intel Chipset Software Allow Privilege Escalation
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | chipset_software | to 10.1.20266.8668 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-276 | During installation, installed file permissions are set to allow anyone to modify those files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves incorrect default permissions in some Intel(R) Chipset Software versions before 10.1.20266.8668. It exists within Ring 3, which is the user application level, and may allow an escalation of privilege.
An authenticated user with local access, combined with a high complexity attack and active user interaction, could exploit this vulnerability to gain higher privileges than intended.
How can this vulnerability impact me? :
The vulnerability may impact the confidentiality, integrity, and availability of the vulnerable system at a high level.
Specifically, it could allow an attacker to escalate privileges, potentially compromising system security and stability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know