Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3813 articles · 152948 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-20879EXPLOITED
Intel · Intel(R) Data Center Graphics Driver for VMware ESXi software

CVE-2026-20879: Out-of-bounds write for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ri

Description

Out-of-bounds write for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1: Device Drivers may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable data corruption. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts.

Affected Products

VendorProductVersions
IntelIntel(R) Data Center Graphics Driver for VMware ESXi softwarebefore version 2.0.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
intelgraphics drivercert_advisory90%

References

  • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01402.html

Related News (2 articles)

Tier B
BSI Advisories5h ago
[NEU] [hoch] Intel Data Center Graphics Driver für VMware ESXi: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB20h ago
CVE-2026-20879 | Vmware Intel Data Center Graphics Driver for VMware ESXi software out-of-bounds write (intel-sa-01402)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-787
PublishedMay 12, 2026
Last enriched4h agov3
Trending Score57
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-20794EXP
CVE-2026-20794: Buffer overflow for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Ring 1
Trending: 66
HIGHCVE-2026-20751EXP
CVE-2026-20751: Out-of-bounds read for the Intel(R) Data Center Graphics Driver for VMware ESXi software before version 2.0.2 within Rin
Trending: 57
NONECVE-2025-35969
CVE-2025-35969: Uncontrolled search path for some Intel(R) Server Firmware Update Utility Software before version 16.0.12. within Ring 3
Trending: 36
HIGHPRE-CVE
Multiple Vulnerabilities in Intel Processors Allow Local Privilege Escalation and Information Disclosure
Trending: 27
NONECVE-2026-20718
CVE-2026-20718: Incorrect default permissions for some Intel(R) NPU Driver software installers before version 32.0.100.4511 within Ring
Trending: 23

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 12, 2026
Discovered by ZDM
May 12, 2026
Updated: affectedVersions
May 12, 2026
Actively Exploited
May 12, 2026
Exploit Available
May 12, 2026
Updated: vendor, severity, exploitAvailable, activelyExploited
May 13, 2026

Version History

v3
Last enriched 4h ago
v3Tier B4h ago

Updated vendor to Intel, changed severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.

vendorseverityexploitAvailableactivelyExploited
via BSI Advisories
v2Tier C20h ago

Updated vendor to VMware, changed severity to CRITICAL, and revised affected versions to up to 2.0.1.

affectedVersions
via VulDB
v120h ago

Initial creation