[CIAD-2026-0013] Multiple Vulnerabilities in Intel Products

By Published On: March 12, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Intel Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: High


Software Affected


Intel® Core™ Ultra Processors Series 2

Intel® Core™ Ultra Processors Series 1

Intel® Xeon® E processor family

Intel Core® Processors

Intel® Xeon® 6

Intel® Xeon® Scalable processor family

Intel® Atom® Processors P6000

Intel ® Xeon ® Scalable Processors

Intel® Xeon® Scalable processors

Intel® Xeon® W Processor Family

Intel® Xeon® W processor 2200 series

Intel® Core™ X-series processor

Intel® Xeon® E Processors

Intel® Atom® Processors

Intel Atom® Processor X Series

Intel® Core™ Processor Family

Intel® Core™ Processors

Intel® Xeon® Scalable processor

Intel® Xeon® W processor 3100 series

Intel® Xeon® W processor 2100 series

Intel® Xeon® Processor D Family

Intel Atom® C5000 and P5000 Product Family

Intel® Core™ X-series Processors

Intel® Xeon® Processor E7 v3 Family

Intel® Xeon® Processor E5 v4 Family

Intel® Atom® C processor Family

Intel® Xeon® D processor family

Intel® Xeon® Processor D NS Family

Note: For versions refer to the OEM advisory given in the references section.


Overview


Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges and obtain sensitive information on the targeted system.


Target Audience:

Individuals and organizations using the above-mentioned Intel products.


Risk Assessment:

High risk of full System Compromise, System Instability or Sensitive Information Disclosure.


Impact Assessment:

Potential unauthorized access to sensitive information, privilege escalation or disruption of system operations.


Description


Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges and obtain sensitive information on the targeted system.


For a complete list of affected products, CVEs, workarounds and solutions, refer to the Intel security Advisories given in the references section.




Solution


Apply appropriate security updates as mentioned in the Intel Security updates:  

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html


Vendor Information


Intel

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html


References


 

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmy1PgACgkQ3jCgcSdc

ys9fEA//Twtq7zkagqIf681u2qYsE5WrLzsKdig3Bb76dnkB47WhI07zKfz4H0SO

oZCTQyzcPFamLWODeoTG91Y06EdRT7kBTYj4dy7eI6D5zJKEpTLxhXs+yUvudYDn

ClBXmuCy23piJTvSdEBmiHqasqgDswqZFalsuop9NSP36hBRpLNlxqYe7zKKn013

JBH0sqcJlFxq0J/b6015Cdt83+bMeF0FwKWGwFZxvvwJHwMaK8lxX85JKJJkTAVD

Xnoj6IV3Un2k88xGd5t1UlRzVWkI5YQIWAsccMtAvJI+WJX1klNa///9f+qdNMvf

/0phv9tyYfzb2fckUbUDUzc0N8Mne4PdiFkoXNxW60Cy4bA/l57cOM+yghTdXib+

w1VZ4qRbEAOx8kwRfTGGrKS9hxhTVMe8iDm9r0js/vLqAbwv0/4rY0pNKBMESbHe

KctPIHORzypvRGtx2D8bHJVl2TG5OMfJ3JR6MaafOppQ0H0EU38dw/aagQDUjCUV

nO4AXcez/t+xlg3nEBRoJfa0FvpSExQPNcEI+SSRNevshQgly23BZJaf1IPBUX7/

s4xyp0KBf88nfYqCm4vehjW27z2WxclAhYO0elqD9kPT1Oi53Smkwp0vGIbICfin

CgbIVH1WlhL7baBnpdNEWOt7LifNe9UJE2q/rJljr8tYXVng/GU=

=Z85X

—–END PGP SIGNATURE—–

Share this article