Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-24848 (GCVE-0-2025-24848)
Vulnerability from cvelistv5 – Published: 2025-11-11 16:50 – Updated: 2025-11-13 04:55- Escalation of Privilege
- CWE-693 - Protection Mechanism Failure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) CIP software |
Affected:
before version WIN_DCA_2.4.0.11001
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-24848",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-12T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T04:55:22.278Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) CIP software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version WIN_DCA_2.4.0.11001"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"cvssV4_0": {
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en"
},
{
"cweId": "CWE-693",
"description": "Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-11T16:50:00.700Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html",
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2025-24848",
"datePublished": "2025-11-11T16:50:00.700Z",
"dateReserved": "2025-01-25T04:00:26.159Z",
"dateUpdated": "2025-11-13T04:55:22.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-24848\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2025-11-11T17:15:43.577\",\"lastModified\":\"2025-11-26T15:15:17.960\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.3,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.11001\",\"matchCriteriaId\":\"3D1985FF-2EEE-491C-8E9D-93DA3D9B984C\"}]}]}],\"references\":[{\"url\":\"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2025-28674
Vulnerability from cnvd - Published: 2025-11-17目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://www.intel.com/content/www/us/en/download/19296/intel-computing-improvement-program.html?product=43559
| Name | Intel Intel CIP <WIN_DCA_2.4.0.11001 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-24848",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-24848"
}
},
"description": "Intel CIP\u662f\u82f1\u7279\u5c14\u63a8\u51fa\u7684\u4e00\u9879\u53ef\u9009\u8ba1\u5212\uff0c\u65e8\u5728\u901a\u8fc7\u6536\u96c6\u7528\u6237\u8ba1\u7b97\u673a\u7684\u6027\u80fd\u6570\u636e\u6765\u6539\u8fdb\u4ea7\u54c1\u3002\n\nIntel CIP\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4fdd\u62a4\u673a\u5236\u5931\u6548\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6743\u9650\u63d0\u5347\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51:\r\nhttps://www.intel.com/content/www/us/en/download/19296/intel-computing-improvement-program.html?product=43559",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-28674",
"openTime": "2025-11-17",
"patchDescription": "Intel CIP\u662f\u82f1\u7279\u5c14\u63a8\u51fa\u7684\u4e00\u9879\u53ef\u9009\u8ba1\u5212\uff0c\u65e8\u5728\u901a\u8fc7\u6536\u96c6\u7528\u6237\u8ba1\u7b97\u673a\u7684\u6027\u80fd\u6570\u636e\u6765\u6539\u8fdb\u4ea7\u54c1\u3002\r\n\r\nIntel CIP\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4fdd\u62a4\u673a\u5236\u5931\u6548\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6743\u9650\u63d0\u5347\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel CIP\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2025-28674\uff09\u7684\u8865\u4e01",
"products": {
"product": "Intel Intel CIP \u003cWIN_DCA_2.4.0.11001"
},
"referenceLink": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html",
"serverity": "\u4e2d",
"submitTime": "2025-11-14",
"title": "Intel CIP\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2025-28674\uff09"
}
CERTFR-2025-AVI-0993
Vulnerability from certfr_avis - Published: 2025-11-12 - Updated: 2025-11-12
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | les processeurs Intel | Famille de processeurs Intel Xeon D sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Sig Test Phoenix versions 5.1.x antérieures à 5.1.08 | ||
| Intel | les processeurs Intel | Intel MPI Library pour Windows versions antérieures à 2021.16 | ||
| Intel | les processeurs Intel | Intel oneAPI Math Kernel Library versions antérieures à 2025.2 | ||
| Intel | les processeurs Intel | Intel DSA versions antérieures à 25.2 | ||
| Intel | les processeurs Intel | Intel Distribution pour Python versions antérieures à 2025.2.0 | ||
| Intel | les processeurs Intel | Intel Killer versions antérieures à 40.25.509.1465 | ||
| Intel | les processeurs Intel | Intel Processor Identification Utility versions antérieures à 8.0.43 | ||
| Intel | les processeurs Intel | Intel Rapid Storage Technology versions 18.x antérieures à 18.1.1042 | ||
| Intel | les processeurs Intel | Intel Gaudi versions antérieures à 1.21.0 | ||
| Intel | les processeurs Intel | ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions antérieures à 1.5.1.0 | ||
| Intel | les processeurs Intel | Intel Server Configuration Utility versions antérieures à 16.0.12 | ||
| Intel | les processeurs Intel | Intel QAT Windows versions antérieures à 2.6.0 | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core Ultra sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Intel PresentMon versions antérieures à 2.3.1 | ||
| Intel | les processeurs Intel | Intel oneAPI HPC Toolkit versions antérieures à 2025.2 | ||
| Intel | les processeurs Intel | Intel SoC Thermal IPF Extension Provider versions antérieures à 03.03.1002 | ||
| Intel | les processeurs Intel | Intel Iris Xe graphics versions antérieures à 32.0.101.6913 | ||
| Intel | les processeurs Intel | Intel CIP versions antérieures à WIN_DCA_2.4.0.11001 | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Xeon 6 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Sig Test versions 6.1.x antérieures à 6.1.08 | ||
| Intel | les processeurs Intel | Intel HPC Toolkit versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | ITT API versions antérieures à 3.25.4 | ||
| Intel | les processeurs Intel | Display Virtualization pour Windows OS driver versions antérieures à 1797 | ||
| Intel | les processeurs Intel | Intel oneAPI Base Toolkit versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | Intel Thread Director Visualizer versions antérieures à 1.1.1 | ||
| Intel | les processeurs Intel | Intel® Graphics versions antérieures 25.22.1502.2 | ||
| Intel | les processeurs Intel | FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions antérieures à 2025.0.1 | ||
| Intel | les processeurs Intel | ACAT versions antérieures à 3.13 | ||
| Intel | les processeurs Intel | Intel Arc graphics versions antérieures à 32.0.101.6913 | ||
| Intel | les processeurs Intel | Intel VTune Profiler versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | Intel SEL Viewer Utility software, toutes versions | ||
| Intel | les processeurs Intel | Intel System Support Utility pour Windows versions antérieures à 4.1.0 | ||
| Intel | les processeurs Intel | Intel Arc Pro graphics versions antérieures à 32.0.101.6862 | ||
| Intel | les processeurs Intel | Intel LTS kernel versions antérieures à lts-v6.12.24-linux-250501T040919Z | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 12e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 11e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Intel Server Firmware Update Utility versions antérieures à 16.0.12 | ||
| Intel | les processeurs Intel | Intel Neural Compressor versions antérieures à 3.4 | ||
| Intel | les processeurs Intel | Intel OFU versions antérieures à 14.1.31 | ||
| Intel | les processeurs Intel | Intel PROSet/Wireless Wi-Fi versions antérieures à 23.160 | ||
| Intel | les processeurs Intel | Intel Rapid Storage Technology versions 20.x antérieures à 20.0.1021 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Famille de processeurs Intel Xeon D sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Sig Test Phoenix versions 5.1.x ant\u00e9rieures \u00e0 5.1.08",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.16",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2025.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 25.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2025.2.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer versions ant\u00e9rieures \u00e0 40.25.509.1465",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processor Identification Utility versions ant\u00e9rieures \u00e0 8.0.43",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions 18.x ant\u00e9rieures \u00e0 18.1.1042",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Gaudi versions ant\u00e9rieures \u00e0 1.21.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions ant\u00e9rieures \u00e0 1.5.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.12",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QAT Windows versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core Ultra sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PresentMon versions ant\u00e9rieures \u00e0 2.3.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2025.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SoC Thermal IPF Extension Provider versions ant\u00e9rieures \u00e0 03.03.1002",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Iris Xe graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CIP versions ant\u00e9rieures \u00e0 WIN_DCA_2.4.0.11001",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Sig Test versions 6.1.x ant\u00e9rieures \u00e0 6.1.08",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HPC Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ITT API versions ant\u00e9rieures \u00e0 3.25.4",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Display Virtualization pour Windows OS driver versions ant\u00e9rieures \u00e0 1797",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics versions ant\u00e9rieures 25.22.1502.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2025.0.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ACAT versions ant\u00e9rieures \u00e0 3.13",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEL Viewer Utility software, toutes versions",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel System Support Utility pour Windows versions ant\u00e9rieures \u00e0 4.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Pro graphics versions ant\u00e9rieures \u00e0 32.0.101.6862",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel LTS kernel versions ant\u00e9rieures \u00e0 lts-v6.12.24-linux-250501T040919Z",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 11e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Firmware Update Utility versions ant\u00e9rieures \u00e0 16.0.12",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Neural Compressor versions ant\u00e9rieures \u00e0 3.4",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.31",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless Wi-Fi versions ant\u00e9rieures \u00e0 23.160",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions 20.x ant\u00e9rieures \u00e0 20.0.1021",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30506"
},
{
"name": "CVE-2025-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25216"
},
{
"name": "CVE-2025-30185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30185"
},
{
"name": "CVE-2025-20065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20065"
},
{
"name": "CVE-2025-24862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24862"
},
{
"name": "CVE-2025-26402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26402"
},
{
"name": "CVE-2025-31940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31940"
},
{
"name": "CVE-2025-27725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27725"
},
{
"name": "CVE-2025-31645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31645"
},
{
"name": "CVE-2025-31948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31948"
},
{
"name": "CVE-2025-31937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31937"
},
{
"name": "CVE-2025-20056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20056"
},
{
"name": "CVE-2025-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26694"
},
{
"name": "CVE-2025-27249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27249"
},
{
"name": "CVE-2025-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35963"
},
{
"name": "CVE-2025-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24512"
},
{
"name": "CVE-2025-30518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30518"
},
{
"name": "CVE-2025-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35971"
},
{
"name": "CVE-2025-24491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24491"
},
{
"name": "CVE-2025-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24842"
},
{
"name": "CVE-2025-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24834"
},
{
"name": "CVE-2025-32037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32037"
},
{
"name": "CVE-2025-24848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24848"
},
{
"name": "CVE-2025-35968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35968"
},
{
"name": "CVE-2025-25059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25059"
},
{
"name": "CVE-2025-32091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32091"
},
{
"name": "CVE-2025-24314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24314"
},
{
"name": "CVE-2025-32088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32088"
},
{
"name": "CVE-2025-32038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32038"
},
{
"name": "CVE-2025-24918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24918"
},
{
"name": "CVE-2025-32449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32449"
},
{
"name": "CVE-2025-27713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27713"
},
{
"name": "CVE-2025-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22391"
},
{
"name": "CVE-2025-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32001"
},
{
"name": "CVE-2025-24838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24838"
},
{
"name": "CVE-2025-26405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26405"
},
{
"name": "CVE-2025-20622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20622"
},
{
"name": "CVE-2025-24299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24299"
},
{
"name": "CVE-2025-27710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27710"
},
{
"name": "CVE-2025-31931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31931"
},
{
"name": "CVE-2025-20614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20614"
},
{
"name": "CVE-2025-30182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30182"
},
{
"name": "CVE-2025-24307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24307"
},
{
"name": "CVE-2025-24863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24863"
},
{
"name": "CVE-2025-35972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35972"
},
{
"name": "CVE-2025-31647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31647"
},
{
"name": "CVE-2025-27712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27712"
},
{
"name": "CVE-2025-32446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32446"
},
{
"name": "CVE-2025-24519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24519"
},
{
"name": "CVE-2025-24516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24516"
},
{
"name": "CVE-2025-33029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33029"
},
{
"name": "CVE-2025-27246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27246"
},
{
"name": "CVE-2025-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35967"
},
{
"name": "CVE-2025-30255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30255"
},
{
"name": "CVE-2025-20050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20050"
},
{
"name": "CVE-2025-31146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31146"
},
{
"name": "CVE-2025-27711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27711"
},
{
"name": "CVE-2025-30509",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30509"
},
{
"name": "CVE-2025-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32732"
},
{
"name": "CVE-2025-24847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24847"
},
{
"name": "CVE-2025-24327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24327"
},
{
"name": "CVE-2025-20010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20010"
},
{
"name": "CVE-2025-33000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33000"
}
],
"initial_release_date": "2025-11-12T00:00:00",
"last_revision_date": "2025-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0993",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01380",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01380.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01337",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01337.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01356",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01356.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01365",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01365.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01366",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01366.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01360",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01360.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01400",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01400.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01386",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01386.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01355",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01355.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01374",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01374.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01331",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01331.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01373",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01376",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01376.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01394",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01394.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01304",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01304.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01392",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01392.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01334",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01334.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01362",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01362.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01364",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01364.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01375",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01375.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01303",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01303.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01377",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01377.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01382",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01382.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01398",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01328",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01327",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01327.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01378",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01378.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01388",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01388.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01361",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01361.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01395",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01395.html"
}
]
}
CERTFR-2025-AVI-0993
Vulnerability from certfr_avis - Published: 2025-11-12 - Updated: 2025-11-12
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | les processeurs Intel | Famille de processeurs Intel Xeon D sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Sig Test Phoenix versions 5.1.x antérieures à 5.1.08 | ||
| Intel | les processeurs Intel | Intel MPI Library pour Windows versions antérieures à 2021.16 | ||
| Intel | les processeurs Intel | Intel oneAPI Math Kernel Library versions antérieures à 2025.2 | ||
| Intel | les processeurs Intel | Intel DSA versions antérieures à 25.2 | ||
| Intel | les processeurs Intel | Intel Distribution pour Python versions antérieures à 2025.2.0 | ||
| Intel | les processeurs Intel | Intel Killer versions antérieures à 40.25.509.1465 | ||
| Intel | les processeurs Intel | Intel Processor Identification Utility versions antérieures à 8.0.43 | ||
| Intel | les processeurs Intel | Intel Rapid Storage Technology versions 18.x antérieures à 18.1.1042 | ||
| Intel | les processeurs Intel | Intel Gaudi versions antérieures à 1.21.0 | ||
| Intel | les processeurs Intel | ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions antérieures à 1.5.1.0 | ||
| Intel | les processeurs Intel | Intel Server Configuration Utility versions antérieures à 16.0.12 | ||
| Intel | les processeurs Intel | Intel QAT Windows versions antérieures à 2.6.0 | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core Ultra sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Intel PresentMon versions antérieures à 2.3.1 | ||
| Intel | les processeurs Intel | Intel oneAPI HPC Toolkit versions antérieures à 2025.2 | ||
| Intel | les processeurs Intel | Intel SoC Thermal IPF Extension Provider versions antérieures à 03.03.1002 | ||
| Intel | les processeurs Intel | Intel Iris Xe graphics versions antérieures à 32.0.101.6913 | ||
| Intel | les processeurs Intel | Intel CIP versions antérieures à WIN_DCA_2.4.0.11001 | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Xeon 6 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Sig Test versions 6.1.x antérieures à 6.1.08 | ||
| Intel | les processeurs Intel | Intel HPC Toolkit versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | ITT API versions antérieures à 3.25.4 | ||
| Intel | les processeurs Intel | Display Virtualization pour Windows OS driver versions antérieures à 1797 | ||
| Intel | les processeurs Intel | Intel oneAPI Base Toolkit versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | Intel Thread Director Visualizer versions antérieures à 1.1.1 | ||
| Intel | les processeurs Intel | Intel® Graphics versions antérieures 25.22.1502.2 | ||
| Intel | les processeurs Intel | FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions antérieures à 2025.0.1 | ||
| Intel | les processeurs Intel | ACAT versions antérieures à 3.13 | ||
| Intel | les processeurs Intel | Intel Arc graphics versions antérieures à 32.0.101.6913 | ||
| Intel | les processeurs Intel | Intel VTune Profiler versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | Intel SEL Viewer Utility software, toutes versions | ||
| Intel | les processeurs Intel | Intel System Support Utility pour Windows versions antérieures à 4.1.0 | ||
| Intel | les processeurs Intel | Intel Arc Pro graphics versions antérieures à 32.0.101.6862 | ||
| Intel | les processeurs Intel | Intel LTS kernel versions antérieures à lts-v6.12.24-linux-250501T040919Z | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 12e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 11e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Intel Server Firmware Update Utility versions antérieures à 16.0.12 | ||
| Intel | les processeurs Intel | Intel Neural Compressor versions antérieures à 3.4 | ||
| Intel | les processeurs Intel | Intel OFU versions antérieures à 14.1.31 | ||
| Intel | les processeurs Intel | Intel PROSet/Wireless Wi-Fi versions antérieures à 23.160 | ||
| Intel | les processeurs Intel | Intel Rapid Storage Technology versions 20.x antérieures à 20.0.1021 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Famille de processeurs Intel Xeon D sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Sig Test Phoenix versions 5.1.x ant\u00e9rieures \u00e0 5.1.08",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.16",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2025.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 25.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2025.2.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer versions ant\u00e9rieures \u00e0 40.25.509.1465",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processor Identification Utility versions ant\u00e9rieures \u00e0 8.0.43",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions 18.x ant\u00e9rieures \u00e0 18.1.1042",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Gaudi versions ant\u00e9rieures \u00e0 1.21.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions ant\u00e9rieures \u00e0 1.5.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.12",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QAT Windows versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core Ultra sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PresentMon versions ant\u00e9rieures \u00e0 2.3.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2025.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SoC Thermal IPF Extension Provider versions ant\u00e9rieures \u00e0 03.03.1002",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Iris Xe graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CIP versions ant\u00e9rieures \u00e0 WIN_DCA_2.4.0.11001",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Sig Test versions 6.1.x ant\u00e9rieures \u00e0 6.1.08",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HPC Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ITT API versions ant\u00e9rieures \u00e0 3.25.4",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Display Virtualization pour Windows OS driver versions ant\u00e9rieures \u00e0 1797",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics versions ant\u00e9rieures 25.22.1502.2",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2025.0.1",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ACAT versions ant\u00e9rieures \u00e0 3.13",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEL Viewer Utility software, toutes versions",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel System Support Utility pour Windows versions ant\u00e9rieures \u00e0 4.1.0",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Pro graphics versions ant\u00e9rieures \u00e0 32.0.101.6862",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel LTS kernel versions ant\u00e9rieures \u00e0 lts-v6.12.24-linux-250501T040919Z",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 11e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Firmware Update Utility versions ant\u00e9rieures \u00e0 16.0.12",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Neural Compressor versions ant\u00e9rieures \u00e0 3.4",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.31",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless Wi-Fi versions ant\u00e9rieures \u00e0 23.160",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions 20.x ant\u00e9rieures \u00e0 20.0.1021",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30506"
},
{
"name": "CVE-2025-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25216"
},
{
"name": "CVE-2025-30185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30185"
},
{
"name": "CVE-2025-20065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20065"
},
{
"name": "CVE-2025-24862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24862"
},
{
"name": "CVE-2025-26402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26402"
},
{
"name": "CVE-2025-31940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31940"
},
{
"name": "CVE-2025-27725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27725"
},
{
"name": "CVE-2025-31645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31645"
},
{
"name": "CVE-2025-31948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31948"
},
{
"name": "CVE-2025-31937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31937"
},
{
"name": "CVE-2025-20056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20056"
},
{
"name": "CVE-2025-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26694"
},
{
"name": "CVE-2025-27249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27249"
},
{
"name": "CVE-2025-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35963"
},
{
"name": "CVE-2025-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24512"
},
{
"name": "CVE-2025-30518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30518"
},
{
"name": "CVE-2025-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35971"
},
{
"name": "CVE-2025-24491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24491"
},
{
"name": "CVE-2025-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24842"
},
{
"name": "CVE-2025-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24834"
},
{
"name": "CVE-2025-32037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32037"
},
{
"name": "CVE-2025-24848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24848"
},
{
"name": "CVE-2025-35968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35968"
},
{
"name": "CVE-2025-25059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25059"
},
{
"name": "CVE-2025-32091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32091"
},
{
"name": "CVE-2025-24314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24314"
},
{
"name": "CVE-2025-32088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32088"
},
{
"name": "CVE-2025-32038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32038"
},
{
"name": "CVE-2025-24918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24918"
},
{
"name": "CVE-2025-32449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32449"
},
{
"name": "CVE-2025-27713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27713"
},
{
"name": "CVE-2025-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22391"
},
{
"name": "CVE-2025-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32001"
},
{
"name": "CVE-2025-24838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24838"
},
{
"name": "CVE-2025-26405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26405"
},
{
"name": "CVE-2025-20622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20622"
},
{
"name": "CVE-2025-24299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24299"
},
{
"name": "CVE-2025-27710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27710"
},
{
"name": "CVE-2025-31931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31931"
},
{
"name": "CVE-2025-20614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20614"
},
{
"name": "CVE-2025-30182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30182"
},
{
"name": "CVE-2025-24307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24307"
},
{
"name": "CVE-2025-24863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24863"
},
{
"name": "CVE-2025-35972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35972"
},
{
"name": "CVE-2025-31647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31647"
},
{
"name": "CVE-2025-27712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27712"
},
{
"name": "CVE-2025-32446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32446"
},
{
"name": "CVE-2025-24519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24519"
},
{
"name": "CVE-2025-24516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24516"
},
{
"name": "CVE-2025-33029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33029"
},
{
"name": "CVE-2025-27246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27246"
},
{
"name": "CVE-2025-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-35967"
},
{
"name": "CVE-2025-30255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30255"
},
{
"name": "CVE-2025-20050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20050"
},
{
"name": "CVE-2025-31146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31146"
},
{
"name": "CVE-2025-27711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27711"
},
{
"name": "CVE-2025-30509",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30509"
},
{
"name": "CVE-2025-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32732"
},
{
"name": "CVE-2025-24847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24847"
},
{
"name": "CVE-2025-24327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24327"
},
{
"name": "CVE-2025-20010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20010"
},
{
"name": "CVE-2025-33000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33000"
}
],
"initial_release_date": "2025-11-12T00:00:00",
"last_revision_date": "2025-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0993",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01380",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01380.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01337",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01337.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01356",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01356.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01365",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01365.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01366",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01366.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01360",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01360.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01400",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01400.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01386",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01386.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01355",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01355.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01374",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01374.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01331",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01331.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01373",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01376",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01376.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01394",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01394.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01304",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01304.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01392",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01392.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01334",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01334.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01362",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01362.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01364",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01364.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01375",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01375.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01303",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01303.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01377",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01377.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01382",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01382.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01398",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01328",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01327",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01327.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01378",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01378.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01388",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01388.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01361",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01361.html"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01395",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01395.html"
}
]
}
FKIE_CVE-2025-24848
Vulnerability from fkie_nvd - Published: 2025-11-11 17:15 - Updated: 2025-11-26 15:15| Vendor | Product | Version | |
|---|---|---|---|
| intel | computing_improvement_program | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1985FF-2EEE-491C-8E9D-93DA3D9B984C",
"versionEndExcluding": "2.4.11001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts."
}
],
"id": "CVE-2025-24848",
"lastModified": "2025-11-26T15:15:17.960",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.3,
"impactScore": 5.9,
"source": "secure@intel.com",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "secure@intel.com",
"type": "Secondary"
}
]
},
"published": "2025-11-11T17:15:43.577",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "secure@intel.com",
"type": "Primary"
}
]
}
GHSA-76MW-5QH8-3V5G
Vulnerability from github – Published: 2025-11-11 18:30 – Updated: 2025-11-11 18:30Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
{
"affected": [],
"aliases": [
"CVE-2025-24848"
],
"database_specific": {
"cwe_ids": [
"CWE-693"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-11T17:15:43Z",
"severity": "MODERATE"
},
"details": "Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.",
"id": "GHSA-76mw-5qh8-3v5g",
"modified": "2025-11-11T18:30:18Z",
"published": "2025-11-11T18:30:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24848"
},
{
"type": "WEB",
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.