6.7
MEDIUM CVSS 3.1
CVE-2025-32092
Intel Graphics Software Privilege Escalation Vulnerability
Description

Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

INFO

Published Date :

Feb. 10, 2026, 5:16 p.m.

Last Modified :

April 20, 2026, 12:25 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2025-32092 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel graphics_driver
2 Intel arc_a310
3 Intel arc_a380
4 Intel arc_a530m
5 Intel arc_a550m
6 Intel arc_a570m
7 Intel arc_a580
8 Intel arc_a730m
9 Intel arc_a750
10 Intel arc_a770
11 Intel arc_a770m
12 Intel core_ultra_3_105ul
13 Intel core_ultra_5_115u
14 Intel core_ultra_5_125h
15 Intel core_ultra_5_125hl
16 Intel core_ultra_5_125u
17 Intel core_ultra_5_125ul
18 Intel core_ultra_5_134u
19 Intel core_ultra_5_135h
20 Intel core_ultra_5_135hl
21 Intel core_ultra_5_135u
22 Intel core_ultra_5_135ul
23 Intel core_ultra_7_155h
24 Intel core_ultra_7_155hl
25 Intel core_ultra_7_155u
26 Intel core_ultra_7_155ul
27 Intel core_ultra_7_164u
28 Intel core_ultra_7_165h
29 Intel core_ultra_7_165hl
30 Intel core_ultra_7_165u
31 Intel core_ultra_7_165ul
32 Intel core_ultra_9_185h
33 Intel arc_130t
34 Intel arc_130v
35 Intel arc_140t
36 Intel arc_140v
37 Intel arc_a350m
38 Intel arc_a370m
39 Intel arc_b370
40 Intel arc_b390
41 Intel arc_b570
42 Intel arc_b580
43 Intel arc_pro_b50
44 Intel arc_pro_b60
45 Intel core_ultra_5_225
46 Intel core_ultra_5_225h
47 Intel core_ultra_5_225t
48 Intel core_ultra_5_225u
49 Intel core_ultra_5_226v
50 Intel core_ultra_5_228v
51 Intel core_ultra_5_235
52 Intel core_ultra_5_235h
53 Intel core_ultra_5_235hx
54 Intel core_ultra_5_235t
55 Intel core_ultra_5_235u
56 Intel core_ultra_5_236v
57 Intel core_ultra_5_238v
58 Intel core_ultra_5_245
59 Intel core_ultra_5_245hx
60 Intel core_ultra_5_245k
61 Intel core_ultra_5_245t
62 Intel core_ultra_5_322
63 Intel core_ultra_5_325
64 Intel core_ultra_5_332
65 Intel core_ultra_5_335
66 Intel core_ultra_5_336h
67 Intel core_ultra_5_338h
68 Intel core_ultra_7_255h
69 Intel core_ultra_7_255hx
70 Intel core_ultra_7_255u
71 Intel core_ultra_7_256v
72 Intel core_ultra_7_258v
73 Intel core_ultra_7_265
74 Intel core_ultra_7_265h
75 Intel core_ultra_7_265hx
76 Intel core_ultra_7_265k
77 Intel core_ultra_7_265t
78 Intel core_ultra_7_265u
79 Intel core_ultra_7_266v
80 Intel core_ultra_7_268v
81 Intel core_ultra_7_355
82 Intel core_ultra_7_356h
83 Intel core_ultra_7_365
84 Intel core_ultra_7_366h
85 Intel core_ultra_9_275hx
86 Intel core_ultra_9_285
87 Intel core_ultra_9_285h
88 Intel core_ultra_9_285hx
89 Intel core_ultra_9_285k
90 Intel core_ultra_9_285t
91 Intel core_ultra_9_288v
92 Intel core_ultra_9_386h
93 Intel core_ultra_x7_358h
94 Intel core_ultra_x9_388h
95 Intel arc_pro_a30m
96 Intel arc_pro_a40
97 Intel arc_pro_a50
98 Intel arc_pro_a60
99 Intel arc_pro_a60m
100 Intel graphics_software
101 Intel linux_intel_lts_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM 6dda929c-bb53-4a77-a76d-48e79601a1ce
CVSS 3.1 MEDIUM [email protected]
CVSS 4.0 MEDIUM 6dda929c-bb53-4a77-a76d-48e79601a1ce
CVSS 4.0 MEDIUM [email protected]
Solution
Update Intel Graphics Software to patch privilege escalation vulnerabilities.
  • Update Intel Graphics Software to version 25.30.1702.0 or later.
  • Apply vendor-provided security patches immediately.
  • Verify successful installation and patch verification.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-32092.

URL Resource
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01385.html Patch Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-32092 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-32092 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-32092 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-32092 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Apr. 20, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:* versions up to (excluding) 32.0.101.7026 OR cpe:2.3:h:intel:arc_a750:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a770:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a580:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a380:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a310:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a770m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a730m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a570m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a550m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a530m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_3_105ul:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_115u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_125h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_125hl:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_125u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_125ul:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_134u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_135h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_135hl:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_135u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_135ul:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_155h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_155hl:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_155u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_155ul:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_164u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_165h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_165hl:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_165u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_165ul:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_185h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_130t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_130v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_140t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_140v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a350m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_a370m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_b570:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_b580:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_b50:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_b60:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_225:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_225h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_225t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_225u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_226v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_228v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_235:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_235h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_235hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_235t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_235u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_236v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_238v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_245:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_245hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_245k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_245t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_322:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_325:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_332:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_335:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_336h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_5_338h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_255h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_255hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_255u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_256v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_258v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_265u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_266v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_268v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_355:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_356h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_365:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_7_366h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_275hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_285:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_285h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_285hx:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_285k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_285t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_288v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_9_386h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_x7_358h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_ultra_x9_388h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_b370:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_b390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:* versions up to (excluding) 32.0.101.6979 OR cpe:2.3:h:intel:arc_pro_a30m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_a40:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_a50:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_a60:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_a60m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_b50:-:*:*:*:*:*:*:* cpe:2.3:h:intel:arc_pro_b60:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:graphics_software:*:*:*:*:*:*:*:* versions up to (excluding) 25.30.1702.0 *cpe:2.3:a:intel:linux_intel_lts_kernel:*:*:*:*:lts:*:*:* versions up to (excluding) 6.12.28-linux-250521T070434Z
    Added Reference Type Intel Corporation: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01385.html Types: Patch, Vendor Advisory
  • New CVE Received by [email protected]

    Feb. 10, 2026

    Action Type Old Value New Value
    Added Description Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
    Added CVSS V4.0 AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-277
    Added Reference https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01385.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.