Description
Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Published: 2026-05-12
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is caused by improper input validation in Intel Endpoint Management Assistant (EMA) before version 1.14.5, permitting unprivileged software running in ring 3 to gain higher privileges. No user interaction or network connection is needed, and the attack has a low complexity requirement. Once exploited, the attacker would obtain elevated rights, directly threatening the confidentiality, integrity, and availability of the affected system with high severity.

Affected Systems

Intel Endpoint Management Assistant (EMA) software, versions earlier than 1.14.5. These builds contain the vulnerable code path that allows local privilege escalation.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity issue. Although EPSS data is not available and the vulnerability has not appeared in the CISA KEV catalog, the low‑complexity, local exploitation pathway makes it a serious threat to systems that have not been patched. An attacker able to run malicious code with the same or lower privileges as the EMA component can trigger the flaw without user involvement.

Generated by OpenCVE AI on May 12, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Intel Endpoint Management Assistant to version 1.14.5 or later to eliminate the input validation error.
  • If an upgrade cannot be performed immediately, limit unprivileged users from executing EMA or disable features that accept external input to mitigate the risk of abuse.
  • Apply additional security controls such as application whitelisting or stricter privilege assignment for the EMA component, and monitor logs for abnormal invocation patterns.

Generated by OpenCVE AI on May 12, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Input Validation in Intel Endpoint Management Assistant

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:57:56.434Z

Reserved: 2025-04-15T21:26:44.080Z

Link: CVE-2025-35990

cve-icon Vulnrichment

Updated: 2026-05-12T17:06:24.921Z

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:13.467

Modified: 2026-05-12T17:16:13.467

Link: CVE-2025-35990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T17:30:21Z

Weaknesses