CVE-2026-20879 Overview
CVE-2026-20879 is an out-of-bounds write vulnerability [CWE-787] in the Intel Data Center Graphics Driver for VMware ESXi before version 2.0.2. The flaw resides within Ring 1 device driver code and can be triggered by a local, privileged user. Successful exploitation may cause data corruption, integrity loss, and denial of service on affected ESXi hosts. The vulnerability does not require user interaction and has low attack complexity. Intel published advisory SA-01402 describing the issue and the fixed driver release.
Critical Impact
A privileged local attacker can corrupt kernel-adjacent memory in the Intel Data Center Graphics ESXi driver, causing high-impact integrity and availability loss on virtualization hosts.
Affected Products
- Intel Data Center Graphics Driver for VMware ESXi versions prior to 2.0.2
- VMware ESXi hosts running the affected Intel graphics driver
- Workloads dependent on Intel Data Center GPU acceleration under ESXi
Discovery Timeline
- 2026-05-12 - CVE-2026-20879 published to NVD
- 2026-05-13 - Last updated in NVD database
Technical Details for CVE-2026-20879
Vulnerability Analysis
The vulnerability is an out-of-bounds write [CWE-787] in the Intel Data Center Graphics Driver for VMware ESXi. The driver executes within Ring 1 device driver context, where memory corruption directly affects hypervisor stability. An attacker with a privileged local account on the ESXi host can submit crafted input that causes the driver to write past the bounds of an allocated buffer.
The write primitive enables data corruption inside driver memory structures. Because the affected component operates at a device driver privilege level, corrupted state can propagate into adjacent kernel structures. The result is high integrity impact and high availability impact on both the vulnerable component and the surrounding subsystem.
The issue does not expose confidential data directly. It enables denial of service through driver or host crashes and may permit modification of in-memory driver structures. Exploitation requires local access and high privileges, which limits scope to operators or compromised privileged accounts on the ESXi host.
Root Cause
The root cause is missing or insufficient bounds checking on a buffer write operation inside the Intel Data Center Graphics ESXi driver. Driver code accepts input that influences a write offset or length without validating that the resulting write stays within the allocated region.
Attack Vector
The attack vector is local. An adversary needs an authenticated, privileged account on the ESXi host or a process running with sufficient privileges to interact with the Intel graphics driver interface. No user interaction is required. The attacker issues driver requests crafted to trigger the out-of-bounds write, leading to memory corruption and denial of service.
No verified exploit code is publicly available for CVE-2026-20879. Refer to the Intel Security Advisory SA-01402 for vendor-supplied technical details.
Detection Methods for CVE-2026-20879
Indicators of Compromise
- Unexpected ESXi host crashes, purple screen events, or driver faults referencing the Intel Data Center Graphics driver
- VMkernel log entries showing memory corruption, page faults, or kernel panics originating in the Intel GPU driver module
- Abnormal restarts of GPU-accelerated workloads on affected ESXi hosts
Detection Strategies
- Inventory ESXi hosts and identify systems running the Intel Data Center Graphics Driver below version 2.0.2
- Correlate VMkernel and vmkernel.log entries for driver-level exceptions with privileged user session activity
- Audit which local accounts and service identities have privileges to load or interact with kernel-mode graphics drivers
Monitoring Recommendations
- Forward ESXi host logs to a central SIEM and alert on kernel panics or driver fault signatures
- Monitor administrative SSH and ESXi Shell sessions for unexpected privileged activity
- Track driver version drift across the virtualization fleet to detect unpatched hosts
How to Mitigate CVE-2026-20879
Immediate Actions Required
- Upgrade the Intel Data Center Graphics Driver for VMware ESXi to version 2.0.2 or later on all affected hosts
- Restrict local and privileged access to ESXi hosts to a minimal set of administrators
- Review and rotate credentials for any account that recently held privileged access to affected hosts
Patch Information
Intel addressed CVE-2026-20879 in Intel Data Center Graphics Driver for VMware ESXi version 2.0.2. Apply the update per vendor guidance in the Intel Security Advisory SA-01402. Validate driver version after installation and confirm host reboot completion before returning workloads to production.
Workarounds
- If patching cannot be performed immediately, limit privileged local access to ESXi hosts to reduce exposure
- Disable or unload the Intel Data Center Graphics driver on hosts where GPU acceleration is not required
- Enforce strict role-based access control and multi-factor authentication for ESXi administrative interfaces
# Verify installed Intel graphics driver version on ESXi
esxcli software vib list | grep -i intel
# After patching, confirm the driver is at 2.0.2 or later
esxcli software vib get -n <intel-graphics-vib-name>
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


