Impact
A buffer overflow exists in the Intel Data Center Graphics Driver for VMware ESXi that allows an attacker with local system access to overwrite critical memory structures in ring‑1 device drivers. The vulnerability can be exploited with a low complexity local attack and no user interaction, leading to escalation of privilege so that the attacker can gain full control of the system. The impact on confidentiality, integrity, and availability is high, as the attacker can modify data, tamper with system state, and potentially render the host inoperable.
Affected Systems
The driver is present in Intel Data Center Graphics Driver for VMware ESXi software. Versions prior to 2.0.2 are affected; any system running the driver before that release is vulnerable.
Risk and Exploitability
The CVSS score of 9.3 indicates very high severity. The EPSS score is not available, so the current exploitation probability is unknown, but the vulnerability is already known to be possible via local access. The vulnerability is not listed in CISA KEV, but its high CVSS and local exploit potential warrant immediate attention. Exploitation requires local access and a privileged system user; that tag indicates an attacker must have the ability to load or interface with the driver. Therefore, restricting privileged access or patching is critical.
OpenCVE Enrichment