[CIAD-2025-044] Multiple Vulnerabilities in Intel Products

By Published On: November 18, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Intel Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: High
Software Affected
Intel® Server Configuration/ Firmware Utility software 
Intel® PROSet / Wireless WiFi products
Intel® Slim Bootloader
Intel® SoC Thermal IPF Extension Provider 
Intel® PresentMon 
Intel® Assistive Context-Aware Toolkit (ACAT) 
Intel® MPI Library 
Intel® Distribution for Python software 
Intel® SEL Viewer 
Intel® UEFI server firmware 
Intel® Killer¿ 
ESXi RDMA driver (irdman) for Intel® 800 Series 
Intel® Thread Director Visualizer 
Intel® Gaudi® 
Intel® QAT 
Intel® oneAPI Math Kernel Library 
Intel® Neural Compressor 
FPGA Support Package for the Intel® oneAPI DPC++/C++ Compiler 
Intel® Rapid Storage Technology 
Intel® DSA 
Intel® System Support Utility 
Intel® Graphics
Intel® VTune¿ Profiler 
Intel® ITT API 
Intel® Processor Identification Utility 
Intel® OFU 
Intel® CIP 
Intel® Sig Test 
Intel® NPU Driver
Intel® Display Virtualization
Note: For versions refer to https://www.intel.com/content/www/us/en/security-center/default.html
Overview
Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges, obtain sensitive information or cause denial of service conditions on the targeted system.
Target Audience:
Individuals and organizations using the above-mentioned Intel products.
Risk Assessment:
High risk of full System Compromise, System Instability or Sensitive Information Disclosure.
Impact Assessment:
Potential unauthorized access to sensitive information, denial of service or full system compromise.
Description
Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges, obtain sensitive information and cause denial of service conditions on the targeted system.
For complete list of affected products, CVEs, workarounds and solutions, refer to the Intel security updates.
https://www.intel.com/content/www/us/en/security-center/default.html
Solution
Apply appropriate security updates as mentioned in:  
https://www.intel.com/content/www/us/en/security-center/default.html
Vendor Information
Intel
https://www.intel.com/content/www/us/en/security-center/default.html
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=q/NH
—–END PGP SIGNATURE—–

Share this article