SB20251114101 - Multiple vulnerabilities in Intel Processor Identification Utility
Published: November 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use of Unmaintained Third Party Components (CVE-ID: CVE-2025-20010)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use of unmaintained third party components. A local user can gain elevated privileges on the target system.
2) Untrusted search path (CVE-ID: CVE-2025-32001)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an untrusted search path. A local user can place a malicious binary into a specific location on the system and execute arbitrary code with escalated privileges.
3) Incorrect default permissions (CVE-ID: CVE-2025-27246)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions. A local user can execute arbitrary code with elevated privileges on the system.
Remediation
Install update from vendor's website.