Description
Out-of-bounds read for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1: Device Drivers may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (none) and availability (high) impacts.
Published: 2026-05-12
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An out‑of‑bounds read in the Intel Data Center Graphics Driver for VMware ESXi before version 2.0.2 allows a local attacker with privileged access to read sensitive memory, potentially exposing confidential data (CWE‑125). The flaw can also trigger a driver crash or hang, resulting in denial‑of‑service of the host and compromising availability. The vulnerability thus poses a high confidentiality risk and a high availability risk, with no direct integrity impact.

Affected Systems

Intel’s Data Center Graphics Driver integrated into VMware ESXi software is affected by this vulnerability in any release prior to version 2.0.2. The flaw affects the driver component used by VMware ESXi hosts that host Intel GPU hardware.

Risk and Exploitability

Exploitation requires local privileged access and low complexity, with no user interaction. An attacker who can install or load the vulnerable driver can trigger the out‑of‑bounds read, causing either a crash (DoS) or the exposure of data from host memory. The CVSS score of 8.3 indicates high severity. EPSS is not available, so the probability of exploitation cannot be precisely expressed, but the local nature suggests a moderate chance where privileged adversaries are present. The vulnerability is not listed in CISA’s KEV catalog, so there is no indication of active exploitation in the wild at this time.

Generated by OpenCVE AI on May 12, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Intel Data Center Graphics Driver for VMware ESXi to version 2.0.2 or later once a patch is released.
  • Restrict privileged user access to the VMware ESXi host and limit driver loading to authorized administrators only.
  • Implement monitoring on ESXi hosts for abnormal memory reads, driver crashes, or repeated service hangs that may indicate exploitation attempts.
  • Apply the latest VMware ESXi security patches and ensure that the hypervisor kernel is current to reduce the attack surface.

Generated by OpenCVE AI on May 12, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Read in Intel Data Center Graphics Driver for VMware ESXi Allows Denial of Service and Data Exposure

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Out-of-bounds read for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1: Device Drivers may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (none) and availability (high) impacts.
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:H/SI:N/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-12T17:07:46.270Z

Reserved: 2025-12-03T17:59:50.542Z

Link: CVE-2026-20751

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:17.220

Modified: 2026-05-12T17:16:17.220

Link: CVE-2026-20751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T17:30:21Z

Weaknesses