Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-32092


Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.7, requiring local system access to exploit but requires specific conditions to be met though user interaction is required requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 101 products from intel, from intel, from intel and 98 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2026, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2026-02-10T17:16:16.553

Last Modified

2026-04-20T12:25:40.723

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-277

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application intel graphics_driver < 32.0.101.7026 Yes
Hardware intel arc_130t - No
Hardware intel arc_130v - No
Hardware intel arc_140t - No
Hardware intel arc_140v - No
Hardware intel arc_a310 - No
Hardware intel arc_a350m - No
Hardware intel arc_a370m - No
Hardware intel arc_a380 - No
Hardware intel arc_a530m - No
Hardware intel arc_a550m - No
Hardware intel arc_a570m - No
Hardware intel arc_a580 - No
Hardware intel arc_a730m - No
Hardware intel arc_a750 - No
Hardware intel arc_a770 - No
Hardware intel arc_a770m - No
Hardware intel arc_b370 - No
Hardware intel arc_b390 - No
Hardware intel arc_b570 - No
Hardware intel arc_b580 - No
Hardware intel arc_pro_b50 - No
Hardware intel arc_pro_b60 - No
Hardware intel core_ultra_3_105ul - No
Hardware intel core_ultra_5_115u - No
Hardware intel core_ultra_5_125h - No
Hardware intel core_ultra_5_125hl - No
Hardware intel core_ultra_5_125u - No
Hardware intel core_ultra_5_125ul - No
Hardware intel core_ultra_5_134u - No
Hardware intel core_ultra_5_135h - No
Hardware intel core_ultra_5_135hl - No
Hardware intel core_ultra_5_135u - No
Hardware intel core_ultra_5_135ul - No
Hardware intel core_ultra_5_225 - No
Hardware intel core_ultra_5_225h - No
Hardware intel core_ultra_5_225t - No
Hardware intel core_ultra_5_225u - No
Hardware intel core_ultra_5_226v - No
Hardware intel core_ultra_5_228v - No
Hardware intel core_ultra_5_235 - No
Hardware intel core_ultra_5_235h - No
Hardware intel core_ultra_5_235hx - No
Hardware intel core_ultra_5_235t - No
Hardware intel core_ultra_5_235u - No
Hardware intel core_ultra_5_236v - No
Hardware intel core_ultra_5_238v - No
Hardware intel core_ultra_5_245 - No
Hardware intel core_ultra_5_245hx - No
Hardware intel core_ultra_5_245k - No
Hardware intel core_ultra_5_245t - No
Hardware intel core_ultra_5_322 - No
Hardware intel core_ultra_5_325 - No
Hardware intel core_ultra_5_332 - No
Hardware intel core_ultra_5_335 - No
Hardware intel core_ultra_5_336h - No
Hardware intel core_ultra_5_338h - No
Hardware intel core_ultra_7_155h - No
Hardware intel core_ultra_7_155hl - No
Hardware intel core_ultra_7_155u - No
Hardware intel core_ultra_7_155ul - No
Hardware intel core_ultra_7_164u - No
Hardware intel core_ultra_7_165h - No
Hardware intel core_ultra_7_165hl - No
Hardware intel core_ultra_7_165u - No
Hardware intel core_ultra_7_165ul - No
Hardware intel core_ultra_7_255h - No
Hardware intel core_ultra_7_255hx - No
Hardware intel core_ultra_7_255u - No
Hardware intel core_ultra_7_256v - No
Hardware intel core_ultra_7_258v - No
Hardware intel core_ultra_7_265 - No
Hardware intel core_ultra_7_265h - No
Hardware intel core_ultra_7_265hx - No
Hardware intel core_ultra_7_265k - No
Hardware intel core_ultra_7_265t - No
Hardware intel core_ultra_7_265u - No
Hardware intel core_ultra_7_266v - No
Hardware intel core_ultra_7_268v - No
Hardware intel core_ultra_7_355 - No
Hardware intel core_ultra_7_356h - No
Hardware intel core_ultra_7_365 - No
Hardware intel core_ultra_7_366h - No
Hardware intel core_ultra_9_185h - No
Hardware intel core_ultra_9_275hx - No
Hardware intel core_ultra_9_285 - No
Hardware intel core_ultra_9_285h - No
Hardware intel core_ultra_9_285hx - No
Hardware intel core_ultra_9_285k - No
Hardware intel core_ultra_9_285t - No
Hardware intel core_ultra_9_288v - No
Hardware intel core_ultra_9_386h - No
Hardware intel core_ultra_x7_358h - No
Hardware intel core_ultra_x9_388h - No
Application intel graphics_driver < 32.0.101.6979 Yes
Hardware intel arc_pro_a30m - No
Hardware intel arc_pro_a40 - No
Hardware intel arc_pro_a50 - No
Hardware intel arc_pro_a60 - No
Hardware intel arc_pro_a60m - No
Hardware intel arc_pro_b50 - No
Hardware intel arc_pro_b60 - No
Application intel graphics_software < 25.30.1702.0 Yes
Application intel linux_intel_lts_kernel < 6.12.28-linux-250521T070434Z Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For intel's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.