
[CIAD-2026-0024] Multiple Vulnerabilities in Intel Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Intel Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: High
Software Affected
Intel Vision software
Intel® EMA software
Display Virtualization for Windows OS driver software
Intel® 800 Series Ethernet Linux kernel drivers
Intel® Slim Bootloader
Intel® Core™ Ultra Series 2
12th Gen Intel® Core™ Processors
13th Gen Intel® Core™ Processors
11th Gen Intel® Core™ Processors
10th Gen Intel® Core™ Processors
Intel® Pentium® Gold Processors
Intel® Celeron® Processors
Intel® Celeron® 6305E/RE
Intel Atom® E3900 Processors
Intel® Xeon® E Family
Intel® Xeon® D Family
Intel® Xeon® W embedded SKUs
Intel® Core™ i3 embedded SKUs
Intel® Core™ i5 embedded SKUs
Intel® Core™ i7 embedded SKUs
Intel® NPU Driver for Linux
Intel® NPU Driver for Windows
Intel® Core™ Ultra 200S Series Processors (Arrow Lake)
Intel® Core™ Ultra Processors Series 2 (Lunar Lake)
Intel® Core™ Ultra Processors Series 3 Panther Lake H
Intel® Data Center Graphics Driver for VMware ESXi software
Intel® QAT software drivers for Windows
Overview
Multiple vulnerabilities have been identified in various Intel products that could allow an attacker to gain elevated privileges, obtain sensitive information and cause denial of service on the targeted system.
Target Audience:
Individuals and organizations using the above-mentioned Intel products.
Risk Assessment:
High risk of full System Compromise, System Instability or Sensitive Information Disclosure.
Impact Assessment:
Potential unauthorized access to sensitive information, privilege escalation or disruption of system operations.
Description
Intel Corporation products are processors, chipsets, firmware, and computing technologies used in PCs, servers, and enterprise systems.
Multiple vulnerabilities have been reported in Intel Products due to Improper Input Validation, Improper buffer restrictions, Improper Check for Unusual or Exceptional Conditions, Use after free, Integer overflow, Classic Buffer Overflow, Incorrect Default Permissions, Shared Microarchitectural Predictor State that Influences Transient Execution, Out-of-bounds Write, Out-of-bounds Read, Untrusted Pointer Dereference, NULL Pointer Dereference, Divide By Zero, Unchecked Return Value.
Successful exploitation of these vulnerabilities could allow attackers to gain elevated privileges, obtain sensitive information and cause denial of service on the targeted system.
Solution
Apply appropriate security updates as mentioned in the Intel Security updates:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01457.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01430.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01426.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01424.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01420.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01402.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html
Vendor Information
Intel
https://www.intel.com/content/www/us/en/security-center/default.html
References
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01457.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01430.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01426.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01424.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01420.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01402.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html
CVE Name
CVE-2026-20887
CVE-2025-35990
CVE-2025-36510
CVE-2025-27723
CVE-2026-20753
CVE-2026-20754
CVE-2026-20718
CVE-2025-35979
CVE-2026-20794
CVE-2026-20879
CVE-2026-20751
CVE-2026-20767
CVE-2026-20738
CVE-2026-20714
CVE-2026-20717
CVE-2026-20782
CVE-2026-20905
CVE-2026-20771
CVE-2026-20881
CVE-2026-20914
CVE-2026-20793
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoMfdoACgkQ3jCgcSdc
ys9ZYA/+Jj54xYL7WIs8oMqw8i7Rhpv6fG5qWqBsV2RJS5eNOGj6OhO05kA50WZC
g11AVfjSC3re+qR4watHnVqne7ZUjKPAGV1iMCEmHijgSvX8Tjo0VVCvgRzuBhzd
uq03OxImgAbBVfwFEFwcga8m9Ych5n+iONGc0wUYCszHU+gGFkdNvFNfeOl0CAtE
PE1Srrebyzcb2xIBWNBhIpaneAJih6saHurFrol+o/HLWFO1rgFDQlYdL5TBrFAz
HRIadAl1HMbHX+4jMMqnQ80VxKFHhaVvLDyK1/msh4Wh9SHpaHtf/n1KUcLfWCCz
Y/KXit6suaXZ4Y9wvS6NNOadcIwHIDC0tuCLZybet7v5a+NsTGmERgdOBmFLyImh
3HNfweEnRj/0pVaVrwuVKC+yk4k3w36ydiVpkgeHQCVV5/zArBBasctq6QVDF/C/
i5KzwjLuDbvToNI07nJgK5KXze2FOPpHPrNxCjtry7RRzCLnO8Wk62yFy9Y9heFY
wtSVfNycXxj11pfUOszEpXy4Uu8Ki0tdqBeUW8eEmcSyoeN+dM2ltFZ5djbi8Mv/
xi0bKh4m0Ivvx2xSUBRcmAcld6ouLkNxdTAWpX6LnpY24ypGrA66Fgh7lhGmmUR9
cxwPdAJNm7Tjs5Wu8isPcuFkeXDcaYUtulvSvOZJ78HrrFArWFM=
=uS48
—–END PGP SIGNATURE—–


