Cyber Posture

CVE-2025-22453

High

Published: 10 February 2026

Published
10 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22453 is a high-severity Improper Input Validation (CWE-20) vulnerability in Intel (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local privilege escalation via improper input validation (CWE-20) in a Ring-3 utility directly matches Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable local code…

more

execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Deeper analysisAI

CVE-2025-22453 is an improper input validation vulnerability affecting the Server Firmware Update Utility (SysFwUpdt) prior to version 16.0.12, specifically within Ring 3 user applications. This flaw, classified under CWE-20, enables an escalation of privilege and has a CVSS v3.1 base score of 7.5 (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). Published on February 10, 2026, it poses high impacts to confidentiality, integrity, and availability on vulnerable systems.

Exploitation requires local access by a system software adversary possessing a privileged user account (PR:H), combined with a high-complexity attack (AC:H) that demands no user interaction (UI:N). Successful attacks can lead to local code execution with a changed scope (S:C), potentially compromising the targeted system without special internal knowledge.

For mitigation details, refer to the Intel Security Advisory at https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01325.html, which provides guidance on updates and protective measures.

Details

CWE(s)

Affected Products

Intel
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-21234Shared CWE-20
CVE-2025-24299Shared CWE-20
CVE-2025-25210Shared CWE-20
CVE-2026-5174Shared CWE-20
CVE-2025-40746Shared CWE-20
CVE-2025-24255Shared CWE-20
CVE-2026-32168Shared CWE-20
CVE-2025-48647Shared CWE-20
CVE-2025-21370Shared CWE-20
CVE-2026-28821Shared CWE-20

References