Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Project Subscriptions

Vendors Products
Endpoint Management Assistant Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel endpoint Management Assistant
Vendors & Products Intel
Intel endpoint Management Assistant

Wed, 13 May 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Input Validation in Intel Endpoint Management Assistant

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:57:56.434Z

Reserved: 2025-04-15T21:26:44.080Z

Link: CVE-2025-35990

cve-icon Vulnrichment

Updated: 2026-05-12T17:06:24.921Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T17:16:13.467

Modified: 2026-05-13T15:52:56.850

Link: CVE-2025-35990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:15:06Z

Weaknesses