Description
Use of Default Cryptographic Key in the hardware for some Intel(R) Pentium(R) Processor Silver Series, Intel(R) Celeron(R) Processor J Series, Intel(R) Celeron(R) Processor N Series may allow an escalation of privilege. Hardware reverse engineer adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via physical access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (none) impacts.
Published: 2026-04-08
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Default cryptographic keys embedded in the silicon of certain Intel Pentium Silver, Celeron J, and Celeron N processors enable an attacker with privileged user access to elevate privileges. The flaw arises from using a predictable hardware key instead of a random one, allowing manipulation of cryptographic operations. The impact on confidentiality is high; integrity and availability are not directly compromised. The likely attack vector involves physical access to the hardware combined with privileged credentials and deep knowledge of the processor internals.

Affected Systems

The vulnerability affects all Intel Pentium Silver series, Celeron J series, and Celeron N series processors. No specific firmware or bootstrap version information is provided, so each unit of the listed families should be examined. Organizations using these CPUs should verify whether default cryptographic keys are in use and whether they belong to the affected families.

Risk and Exploitability

The CVSS score of 5.8 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The advisory is not listed in the CISA KEV catalog, indicating no known public exploitation. Because the attack requires physical access, privileged user rights, and sophisticated hardware reverse engineering, the risk is moderate. Software fixes are limited; updates are typically delivered via microcode or BIOS modifications.

Generated by OpenCVE AI on April 10, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest microcode update issued by Intel as part of Security Advisory SA-00609
  • Confirm that your system’s processors belong to the affected Pentium Silver, Celeron J, or Celeron N families
  • Restrict physical access to the hardware to prevent reverse engineering attempts
  • Apply any available BIOS or firmware updates that replace the default cryptographic key implementation
  • Monitor system logs for unusual privilege escalation activity and keep the microcode up to date

Generated by OpenCVE AI on April 10, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title Escalation of Privilege via Default Cryptographic Key in Intel Processors microcode_ctl: Intel Processors: Escalation of privilege due to default cryptographic key
Weaknesses CWE-1392
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Escalation of Privilege via Default Cryptographic Key in Intel Processors
First Time appeared Intel
Intel celeron Processor J Series
Intel celeron Processor N Series
Intel pentium Processor Silver Series
Vendors & Products Intel
Intel celeron Processor J Series
Intel celeron Processor N Series
Intel pentium Processor Silver Series

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Use of Default Cryptographic Key in the hardware for some Intel(R) Pentium(R) Processor Silver Series, Intel(R) Celeron(R) Processor J Series, Intel(R) Celeron(R) Processor N Series may allow an escalation of privilege. Hardware reverse engineer adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via physical access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (none) impacts.
Weaknesses CWE-1394
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}

cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:P/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

Intel Celeron Processor J Series Celeron Processor N Series Pentium Processor Silver Series
cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-04-08T19:50:31.560Z

Reserved: 2026-01-29T03:59:56.230Z

Link: CVE-2026-20709

cve-icon Vulnrichment

Updated: 2026-04-08T19:49:51.606Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:25:12.600

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-20709

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-08T18:20:48Z

Links: CVE-2026-20709 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:40:35Z

Weaknesses