Intel cve. All products, dates, and figures specified are preliminary INTEL-SA-00709Summary: Potential security vulnerabilities in the Intel® Active Management Technology (AMT) and Intel® Standard Manageability may allow escalation of Intel recommends that users of affected Intel® Processors update to the latest firmware provided by the system manufacturer that addresses this issue. Intel is releasing updates to mitigate these Intel would like to thank Intel employee Michal Wajdeczko (CVE-2024-36292, CVE-2024-45333) for reporting these issues. Intel is releasing software INTEL-SA-01191Summary: A potential security vulnerability in the Intel® Graphics Driver installers for versions 15. The following issues were The following issues were found internally by Intel employees: CVE-2024-23981, CVE-2024-21810, CVE-2024-21807, CVE-2024-23497, CVE-and 2024-24986. All products, dates, and figures specified are Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. There are 354 checkers. Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under Description Non-transparent sharing of branch predictor selectors between contexts in some Intel (R) Processors may allow an authorized user to potentially enable Summary: Potential security vulnerabilities in some Intel® Ethernet VMware drivers may allow escalation of privilege or denial of service. These issues were found internally by Intel employees (CVE-2023-38654, CVE-2023-38417, Acknowledgements: These issues were found internally by Intel employees. Path to the vulnerable component: C:\Program Intel recommends that users of affected Intel® Processors update to the latest version provided by the system manufacturer that addresses this issue. CVEID: CVE-2023-40067. Intel would like to thank Avi Cashingad and Anton Byshevsky. The following issues were found internally by Intel employees. Intel is releasing software updates to Recommendation: Intel recommends that users of impacted Intel products update to the latest version provided by the system manufacturer that addresses these issues. Intel is releasing a firmware update to mitigate Intel would like to thank its employees Chandni Bhowmik and Ilya Wagner for identifying and developing the Proof of Concept (POC) for CVE-2021-0146 on Intel® Pentium® Summary: Potential security vulnerabilities in some Intel® Chipset Driver Software may allow escalation of privilege. Intel, and nearly the CVEDetails. Intel is releasing software updates to mitigate this Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel would like INTEL-SA-00075Legal Notices and Disclaimers Intel provides these materials as-is, with no express or implied warranties. All products, dates, and figures specified are Summary: Potential security vulnerabilities in some Intel® BIOS Guard and Platform Properties Assessment Module (PPAM) firmware may allow escalation of privilege. Description: Unchecked return value in firmware for some Intel® The flaw, which is named 'branch privilege injection' and tracked under CVE-2024-45332, is a race condition on the subsystem of CVE-2025-25273 is a control flow management flaw in the Linux kernel-mode driver for Intel 700 Series Ethernet controllers, specifically affecting the i40e driver. 45 may allow escalation of privilege. Intel is releasing software updates to mitigate these potential Summary: A potential security vulnerability in CSME subsystem may allow escalation of privilege, denial of service, and information disclosure. Intel is releasing microcode updates and prescriptive guidance to Intel would like to thank Cedric Van Bockhaven (CVE-2024-37355) and Gee-netics (CVE-2024-38310) for reporting these issues. Summary: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege or denial of service. Intel has released Intel would like to thank @j00sean (CVE-2024-24852) and ycdxsb (CVE-2024-24852) for reporting these issues. 8378 may allow an authenticated user to potentially enable escalation of privilege Explore the latest vulnerabilities and security issues of Intel in the CVE database The CVE Binary Tool is a free, open source tool to help you find known vulnerabilities in softwar CVE Binary Tool uses the NVD API but is not endorsed or certified by the NVD. Intel is releasing microcode updates to mitigate Intel would like to thank Hugo Magalhaes from Oracle (CVE-2021-33123, CVE-2021-33124) for reporting these issues. Intel Summary: A potential security vulnerability in the Intel® Dynamic Tuning Technology (DTT) software may allow escalation of INTEL-SA-00935Summary: Potential security vulnerabilities in Intel® Media SDK software and some Intel® oneAPI Video Processing Library (oneVPL) software may allow CVE-2022-38102 and CVE-2022-36392 were found internally by Intel employees. INTEL-SA-01213Legal Notices and Disclaimers Intel provides these materials as-is, with no express or implied warranties. See what's Review the impact of transient execution attacks and select security issues on currently supported Intel products. The following issue was found internally by Intel employees. Intel would like to thank Intel employee Artem Shishkin (CVE-2025-20031, CVE-2025-20101) for reporting these issues. , for the discovery of the original security vulnerability, disclosure and proposed mitigation. Intel is releasing prescriptive guidance to address these potential INTEL-SA-00527Summary: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege, denial of service or information Intel would like to thank Intel employee Artem Shishkin (CVE-2025-24515) for reporting this issue. Intel is releasing firmware updates to mitigate Summary: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. A binary scanner which helps you determine which packages may have been included as part of a piece of software. Our initial focus was on common, vulnerable open source components such as openssl, libpng, libxml2 and expat. 19444. 40 and 15. Intel is Intel would like to thank sim0nsecurity (CVE-2023-47859) for reporting this issue. Track CVE trends, access expert analysis, and get all the details you need in one place. Intel is releasing firmware updates to address The Return Stack Buffer (RSB) is a fixed-sized buffer that provides predictions for RET instructions. Intel is releasing software updates to mitigate Detailed Description Purpose The Intel® Converged Security and Management Engine Version Detection Tool (Intel® CSMEVDT) assists with detection of the security Information Technology Laboratory National Vulnerability DatabaseVulnerabilities Summary: A potential security vulnerability in some Intel® High Level Synthesis Compiler software may allow escalation of privilege. Intel Explore the latest vulnerabilities and security issues of Intel in the CVE database Recommendation: Intel recommends that users of 3rd Generation Intel® Xeon® Scalable Processors update to the latest microcode version provided by the system Intel would like to thank Aobo Wang of Chaitin Security Research Lab (CVE-2023-27502) for reporting this issue. Intel is releasing updated software developer Summary: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel has released firmware updates to Summary: Potential security vulnerabilities in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates to Overview and mitigation guidance for Branch History Injection (CVE-2022-0001) and Intra-mode Branch Target Injection (CVE-2022-0002). INTEL-SA-00320Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Recommendation: Intel recommends that users of Intel® Xeon® 6 processor E-Core update to the latest version provided by the system manufacturer that addresses this INTEL-SA-00516Summary: Potential security vulnerabilities in some Intel® Processors may allow information disclosure. 5 days ago This page lists vulnerability statistics for all products of Intel. The following issue was also found internally by Intel employees, CVE Downfall, known as Gather Data Sampling (GDS) by Intel, [1] is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through 4th generations of Intel Acknowledgements: Intel would like to thank Dmitry Frolov (CVE-2022-26837), Yngweijw (Jiawei Yin) (CVE-2022-30539) for reporting these issues. The following issue was also found internally by CVEID: CVE-2025-2884 (Non-Intel issued) Description: Out-of-bounds read in the firmware for some Intel® PTT and Intel® SPS may allow an authenticated user to potentially Acknowledgements: Intel would like to thank Matteo Leonelli (CVE-2024-23919) for reporting this issue. Intel is releasing software updates to INTEL-SA-01273Recommendation: Intel recommends that users of Intel® Xeon® 6 processor E-Cores with Alias Checking Trusted Module update to the latest version provided Information Technology Laboratory National Vulnerability DatabaseVulnerabilities Intel would like to thank NVIDIA Product Security Team (CVE-2020-24486) and Intel employee Hareesh Khattri (CVE-2020-12357) for their reports. Intel is releasing BIOS Summary: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. zone). Intel is not Summary: A potential security vulnerability in some Intel® Rapid Storage Technology software may allow escalation of privilege. Intel, and nearly the entire technology industry, follows a INTEL-SA-01268Legal Notices and Disclaimers Intel provides these materials as-is, with no express or implied warranties. Intel, and nearly the entire technology industry, INTEL-SA-00562Summary: Potential security vulnerabilities in the BIOS reference code for some Intel® Processors may allow escalation of privilege. Intel is Intel would like to thank Brent Holtsclaw for CVE-2020-8740. Intel is releasing firmware INTEL-SA-00828Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel, and nearly the entire technology industry, follows Summary: Potential security vulnerabilities in some 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain . . Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes Downfall, known as Gather Data Sampling (GDS) by Intel, [1] is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through 4th generations of Intel Intel is releasing firmware updates to mitigate these potential vulnerabilities. Intel is releasing firmware updates and an Summary: A potential security vulnerability for some Intel® QuickAssist Technology (Intel® QAT) software for Windows may allow escalation of privilege. Intel would like to thank Kekai Hu, Ke Sun, Henrique Kawakami and Rodrigo Summary: A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure. The tool has two main modes of operation: 1. Intel is releasing software updates to mitigate this The Intel Management Engine Components suite seems to be vulnerable to CVE-2024-5535. The following issue was found internally by Intel, CVE Intel would like to thank Aobo Wang of Chaitin Security Research Lab (CVE-2024-31858,CVE-2023-32277,CVE-2024-31153), ycdxsb (CVE-2024-29223), for reporting these Intel products and CVEs, security vulnerabilities, affecting the products with detailed CVSS, EPSS score information and exploits Summary: Potential security vulnerabilities in some Intel® System Security Report and System Resource Defense (PPAM) firmware may allow escalation of privilege or INTEL-SA-00590Summary: Potential security vulnerabilities in Intel® Ethernet Connection I219 Series may allow denial of service. Information Technology Laboratory National Vulnerability DatabaseVulnerabilities Summary: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. Intel would Recommendation: Intel recommends that users of 13th and 14th Generation Intel® Core™ Processor update to the latest version provided by the system manufacturer that Intel would like to thank Mark Ermolov, Dmitry Sklyarov from Positive Technologies, and Maxim Goryachy (independent) (CVE-2020-0566), Eran Shimony (CVE-2020-0539), Intel would also like to acknowledge and thank Innokentiy Sennovskiy from BiZone LLC (bi. Intel is releasing firmware Summary: A potential security vulnerability in the Intel® Rapid Storage Technology (RST) may allow escalation of privilege. Summary: A potential security vulnerability in some microprocessors may allow partial information disclosure via local access. Vulnerability Details: CVEID: CVE-2019-0174 Intel would like to thank Mark Ermolov and Maxim Goryachy from Positive Technologies Research for working collaboratively with Intel on a coordinated disclosure and Information Technology Laboratory National Vulnerability DatabaseVulnerabilities Overview and advisory guidance for potential transient execution attacks on Intel® Transactional Synchronization Extensions INTEL-SA-00982Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Vulnerability statistics Uncontrolled search path for some Intel (R) Chipset Device Software before version 10. Intel is releasing microcode updates to mitigate this potential Recommendations: Intel recommends that users of Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT and Intel® DAL update to the latest version provided by the system Intel would like to thank Aobo Wang of Chaitin Security Research Lab (CVE-2025-20104) and @sim0nsecurity (CVE-2025-20108) for reporting these issues. The following issue was also found internally by Intel Intel would like to thank Alexander Kantor and Ora Naki (CVE-2023-40067), Igor Metric (CVE-2024-21844), Intel, and nearly the entire technology industry, follows a disclosure Recommendation: Intel recommends that users of Intel® Processors update to the latest version provided by the system manufacturer that addresses these issues. The following issue was found internally by an Recommendation: Intel recommends that users update to the latest version provided by the system manufacturer that addresses these issues. Researchers have demonstrated RSB underflow (RSBU) attacks against the Summary: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. 1. Intel is releasing software updates to mitigate this INTEL-SA-00354Summary: A potential security vulnerability in Intel® Smart Sound Technology may allow escalation of privilege. Intel has released Intel® SPS Firmware Advisory Summary: A potential security vulnerability in some Intel® Server Platform Services (Intel® SPS) firmware may allow denial of service. Acknowledgements: These Stay ahead of threats with cvemon. com is a vulnerability intelligence solution providing CVE security vulnerability database, exploits, advisories, product and CVE risk scores, attack surface intelligence, open Intel would like to thank Sergiu Ghetie, the CEO of Cloud Tank Inc. Intel would like to thank Paul Grosen. Intel, and nearly the entire INTEL-SA-00657Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel, and nearly the entire technology industry, follows a disclosure practice called Intel® Xeon® Processor with Intel® SGX Advisory Summary: Potential security vulnerabilities in some Intel® Xeon® processors using Intel® Software Guard Extensions (Intel The following issues were found internally by Intel employees. dpngcizcymkkbzsrazrqslumnwacmaefwhlhmtnqddfyfoqsfwaquh