Description
Incorrect default permissions for some Intel(R) NPU Driver software installers before version 32.0.100.4511 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Published: 2026-05-12
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw originates from incorrect default permissions on some Intel R NPU Driver installers that are run in user mode. An unprivileged software adversary, combined with a high attack complexity, may elevate privileges during installation. The weakness falls under CWE-276 and can compromise confidentiality, integrity and availability of the host system.

Affected Systems

Intel R NPU Driver software installers released before version 32.0.100.4511 are affected. The vulnerability is present in the default installation package and can be triggered on any system that installs a vulnerable release as a user application.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity. No EPSS score was provided, and it is inferred that exploitation may be relatively rare or limited to local contexts. The vulnerability is not listed in the CISA KEV catalog. Attackers would need local, authenticated access with a high attack complexity and active user interaction. Upon exploitation, the attacker could elevate privileges and potentially compromise the confidentiality, integrity and availability of the affected machine.

Generated by OpenCVE AI on May 12, 2026 at 17:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install Intel R NPU Driver version 32.0.100.4511 or later, which fixes the permission issue.
  • Verify that installer files possess the correct ownership and permissions as specified by the vendor; correct any deviations.
  • Apply the principle of least privilege to user applications that interact with the NPU driver to prevent unauthorized file access or modification.

Generated by OpenCVE AI on May 12, 2026 at 17:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation through Improper Installer Permissions in Intel NPU Driver

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Incorrect default permissions for some Intel(R) NPU Driver software installers before version 32.0.100.4511 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:58:22.215Z

Reserved: 2025-12-03T17:58:55.192Z

Link: CVE-2026-20718

cve-icon Vulnrichment

Updated: 2026-05-12T17:07:58.210Z

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:16.623

Modified: 2026-05-12T17:16:16.623

Link: CVE-2026-20718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:00:12Z

Weaknesses