Risk Scores
CVSS v3.1
4.699999809265137
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
EPSS Score
0.01%
0.5th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| n/a | TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | See references |
Timeline
- Jan 23, 2025 CVE ID Reserved
- Feb 10, 2026 CVE Published
- Feb 11, 2026 EPSS Score
- Feb 12, 2026 EPSS Score
- Feb 14, 2026 EPSS Score
- Feb 15, 2026 EPSS Score
- Feb 17, 2026 EPSS Score
- Feb 18, 2026 EPSS Score
- Feb 20, 2026 EPSS Score
- Feb 21, 2026 EPSS Score
- Feb 23, 2026 EPSS Score
- Feb 24, 2026 EPSS Score
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01323.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01414.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01315.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01408.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01401.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01171.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01403.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01406.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01265.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01412.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01385.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01397.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01314.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01325.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01411.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01415.html advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01399.html advisory
- https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01314.html url
- https://nvd.nist.gov/vuln/detail/CVE-2025-22885 advisory