Impact
The flaw is caused by improper input validation in Intel Endpoint Management Assistant (EMA) before version 1.14.5, permitting unprivileged software running in ring 3 to gain higher privileges. No user interaction or network connection is needed, and the attack has a low complexity requirement. Once exploited, the attacker would obtain elevated rights, directly threatening the confidentiality, integrity, and availability of the affected system with high severity.
Affected Systems
Intel Endpoint Management Assistant (EMA) software, versions earlier than 1.14.5. These builds contain the vulnerable code path that allows local privilege escalation.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity issue. Although EPSS data is not available and the vulnerability has not appeared in the CISA KEV catalog, the low‑complexity, local exploitation pathway makes it a serious threat to systems that have not been patched. An attacker able to run malicious code with the same or lower privileges as the EMA component can trigger the flaw without user involvement.
OpenCVE Enrichment