Description
Buffer overflow for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1: Device Drivers may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
Published: 2026-05-12
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow exists in the Intel Data Center Graphics Driver for VMware ESXi that allows an attacker with local system access to overwrite critical memory structures in ring‑1 device drivers. The vulnerability can be exploited with a low complexity local attack and no user interaction, leading to escalation of privilege so that the attacker can gain full control of the system. The impact on confidentiality, integrity, and availability is high, as the attacker can modify data, tamper with system state, and potentially render the host inoperable.

Affected Systems

The driver is present in Intel Data Center Graphics Driver for VMware ESXi software. Versions prior to 2.0.2 are affected; any system running the driver before that release is vulnerable.

Risk and Exploitability

The CVSS score of 9.3 indicates very high severity. The EPSS score is not available, so the current exploitation probability is unknown, but the vulnerability is already known to be possible via local access. The vulnerability is not listed in CISA KEV, but its high CVSS and local exploit potential warrant immediate attention. Exploitation requires local access and a privileged system user; that tag indicates an attacker must have the ability to load or interface with the driver. Therefore, restricting privileged access or patching is critical.

Generated by OpenCVE AI on May 12, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Intel’s latest driver update (version 2.0.2 or later) to eliminate the buffer overflow
  • Limit the set of users who can load or interact with the graphics driver to minimize local attack surface
  • Continuously monitor privileged process activity for signs of abnormal escalation or unintended driver behavior

Generated by OpenCVE AI on May 12, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in Intel Data Center Graphics Driver for VMware ESXi Leading to Local Privilege Escalation

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Buffer overflow for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1: Device Drivers may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:58:23.326Z

Reserved: 2025-12-03T17:59:50.533Z

Link: CVE-2026-20794

cve-icon Vulnrichment

Updated: 2026-05-12T17:17:37.602Z

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:19.240

Modified: 2026-05-12T17:16:19.240

Link: CVE-2026-20794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T17:30:21Z

Weaknesses