Vulnerability Description
Time-of-check time-of-use race condition in the WheaERST SMM module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-20028?
CVE-2025-20028 is a documented vulnerability. Time-of-check time-of-use race condition in the WheaERST SMM module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combine...
How severe is CVE-2025-20028?
CVSS scoring is not yet available for CVE-2025-20028. Check NVD for updates.
Is there a patch for CVE-2025-20028?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.