Description
Untrusted pointer dereference for some Intel(R) QuickAssist Adapter 8960 software before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Published: 2026-05-12
Score: 8.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Untrusted pointer dereference within the Intel® QuickAssist Adapter 8960 software in Ring 3 can be exploited by a local authenticated user with low complexity to gain privileges above their own. The flaw allows an attacker to acquire full control over the system, potentially resulting in loss of confidentiality, integrity, and availability, as the vulnerability can be triggered without user interaction and without special internal knowledge.

Affected Systems

Intel® QuickAssist Adapter 8960 software versions prior to 1.13 are vulnerable. The impact affects any system running that software and where the exploit may be invoked locally.

Risk and Exploitability

The CVSS score of 8.5 indicates severe risk. With no EPSS score and absence from the CISA KEV catalog, the exact exploit prevalence is unknown. Based on the description, it is inferred that the attack is local, requiring an authenticated user with low complexity and no requirement for network exposure or user interaction, making it a highly actionable risk for systems that rely on the adapter.

Generated by OpenCVE AI on May 12, 2026 at 18:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Intel QuickAssist Adapter Software to version 1.13 or later.
  • If the upgrade is not immediately feasible, restrict or disable the adapter functionality for non-essential services or users.
  • Apply the principle of least privilege to all processes that interface with the adapter and verify that user permissions are appropriately limited.
  • Contact Intel support for any interim mitigations or for confirmation of patch availability.

Generated by OpenCVE AI on May 12, 2026 at 18:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Pointer Dereference in Intel QuickAssist Adapter 8960 Software

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Untrusted pointer dereference for some Intel(R) QuickAssist Adapter 8960 software before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-822
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:57:59.702Z

Reserved: 2025-12-04T04:00:32.857Z

Link: CVE-2026-20738

cve-icon Vulnrichment

Updated: 2026-05-12T17:07:49.522Z

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:16.883

Modified: 2026-05-12T17:16:16.883

Link: CVE-2026-20738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:30:22Z

Weaknesses