CVE-2025-40897
Intel · Threat Intelligence
An access control vulnerability in Intel's Threat Intelligence functionality allows users with view-only privileges to bypass intended restrictions.
Executive summary
An access control flaw in Intel's Threat Intelligence software allows unauthorized users to exceed their view-only permissions, potentially exposing sensitive security data.
Vulnerability
This is an improper access control vulnerability where specific restrictions meant for users with view-only privileges are not correctly enforced. This allows authenticated users to perform actions beyond their authorized scope within the Threat Intelligence module.
Business impact
With a CVSS score of 8.1, this vulnerability presents a high risk of unauthorized information disclosure. While not allowing full system takeover, it permits the leakage of sensitive threat intelligence data, which could compromise an organization's security posture and internal incident response plans.
Remediation
Immediate Action: Apply all relevant security patches provided by Intel as soon as they are made available.
Proactive Monitoring: Review user activity logs within the Threat Intelligence module to identify any anomalous access patterns by view-only users.
Compensating Controls: Temporarily restrict access to the Threat Intelligence module to only the most privileged users until the patch is applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should monitor Intel’s security bulletins for the release of a patch. Once available, the update should be applied immediately to ensure that access controls are correctly enforced and sensitive data is protected from unauthorized viewing.