[CIAD-2026-0008] Multiple Vulnerabilities in Intel Products

By Published On: February 17, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Intel Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: High


Software Affected


Intel® Atom® Server SoCs (P5000, C5000, P6000 families)

Intel® Xeon® Processors, including:

4th and 5th Gen Xeon® Scalable processors

Intel® Xeon® 6 processors (P-core and E-core variants, including SoCs)

Intel® Server Boards and Firmware Packages, including affected BIOS and System Firmware Update Packages (SFUP)

Intel® Server Firmware Update Utility (SysFwUpdt) versions prior to 16.0.12

Systems using Intel® 100¿700 Series Chipsets and Intel® C-series Server Chipsets

Platforms running affected Intel® Converged Security and Management Engine (CSME) / Intel® AMT / Manageability firmware

Select Intel® Core¿ (8th/9th Gen), Core¿ Ultra, Pentium® Gold, and Celeron® processors running impacted firmware versions

Note: For a complete list, refer to the OEM advisory given in the references section.


Overview


Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges, obtain sensitive information or cause denial of service conditions on the targeted system.


Target Audience:

Individuals and organizations using the above-mentioned Intel products.


Risk Assessment:

High risk of privilege escalation, system instability or sensitive information disclosure.


Impact Assessment:

Potential unauthorized access to sensitive information, denial of service, privilege escalation or disruption of system operations.


Description


Multiple vulnerabilities have been identified in certain Intel® products. These vulnerabilities could allow an attacker to gain elevated privileges, access sensitive information, or cause denial-of-service conditions on the affected systems.


For a complete list of affected products, CVEs, workarounds and solutions, refer to the Intel® Security Advisories given in the references section.




Solution


Apply appropriate security updates as mentioned in Intel security updates given in the references section  


Vendor Information


Intel

https://www.intel.com


References


Intel

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01406.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01401.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01397.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01325.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01315.html




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmUgoMACgkQ3jCgcSdc

ys9zIg//dp4VpEgXyFxmVfLSmSBLhJRcqVCp8qApkrPqz3cyp8wGd21pBlezj7io

H3MMhHEsCz4yABj2+u9p5hrHpPZ//xvMDhT6ri9Jp/Lz4av3ugP+CZQIZHAHCYvO

17lHfX8bUES6PEZEWHu7EwtiYD/wqm7VWNSqTIgjuCfHg/Q6I8mtuhA+IDiHejr7

HxDp2REMMOEc17tn4ShXwlddbD7ZBr7fmtz40mN2S5lKz13gIMt2fPBLvQ0ivPll

Nuo8/hlCwgHnla3UyVr8XTgkVU9maVWXttTgFP70Asmou71L65cftGyohHBfUzdP

beV/tHPu6WExjF5M5FkeZlcLWz5uZ7tDiKuv6HkUob9oO3TNbyHHWmxma+Lueqmz

f5tlB3q35eiBk46kKdKwCnt0ruVbR98Iu4YRXVuR80RP7Z0ZKube4JKHfpXPcu0H

qf1TJsP1IIGwuCPfdScGHx46j1AgksdXgubm7x6aCr+Tvnc//nfXntDSxGzdIi51

9nT+yIBJYd2MyVBR2VJHhdfBweNZ5GBNKB5fu/VkIVNMR1QygFBG6+Oy56xE18fY

3CTa6rQmKFDI0fXsQtFskKHFU8/X0UqtHX1TBugmdp2QmApUMZLkPGgdJ9R8j/+E

43qq9vpYFuApuKlFQ+uo9YUXcHsKzbRMNlvTM0OYDfkY2R0yosY=

=lNo3

—–END PGP SIGNATURE—–

Share this article