
[CIAD-2026-0013] Multiple Vulnerabilities in Intel Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Intel Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: High
Software Affected
Intel® Core™ Ultra Processors Series 2
Intel® Core™ Ultra Processors Series 1
Intel® Xeon® E processor family
Intel Core® Processors
Intel® Xeon® 6
Intel® Xeon® Scalable processor family
Intel® Atom® Processors P6000
Intel ® Xeon ® Scalable Processors
Intel® Xeon® Scalable processors
Intel® Xeon® W Processor Family
Intel® Xeon® W processor 2200 series
Intel® Core™ X-series processor
Intel® Xeon® E Processors
Intel® Atom® Processors
Intel Atom® Processor X Series
Intel® Core™ Processor Family
Intel® Core™ Processors
Intel® Xeon® Scalable processor
Intel® Xeon® W processor 3100 series
Intel® Xeon® W processor 2100 series
Intel® Xeon® Processor D Family
Intel Atom® C5000 and P5000 Product Family
Intel® Core™ X-series Processors
Intel® Xeon® Processor E7 v3 Family
Intel® Xeon® Processor E5 v4 Family
Intel® Atom® C processor Family
Intel® Xeon® D processor family
Intel® Xeon® Processor D NS Family
Note: For versions refer to the OEM advisory given in the references section.
Overview
Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges and obtain sensitive information on the targeted system.
Target Audience:
Individuals and organizations using the above-mentioned Intel products.
Risk Assessment:
High risk of full System Compromise, System Instability or Sensitive Information Disclosure.
Impact Assessment:
Potential unauthorized access to sensitive information, privilege escalation or disruption of system operations.
Description
Multiple vulnerabilities have been reported in Intel Products, which could allow an attacker to gain elevated privileges and obtain sensitive information on the targeted system.
For a complete list of affected products, CVEs, workarounds and solutions, refer to the Intel security Advisories given in the references section.
Solution
Apply appropriate security updates as mentioned in the Intel Security updates:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html
Vendor Information
Intel
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html
References
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmy1PgACgkQ3jCgcSdc
ys9fEA//Twtq7zkagqIf681u2qYsE5WrLzsKdig3Bb76dnkB47WhI07zKfz4H0SO
oZCTQyzcPFamLWODeoTG91Y06EdRT7kBTYj4dy7eI6D5zJKEpTLxhXs+yUvudYDn
ClBXmuCy23piJTvSdEBmiHqasqgDswqZFalsuop9NSP36hBRpLNlxqYe7zKKn013
JBH0sqcJlFxq0J/b6015Cdt83+bMeF0FwKWGwFZxvvwJHwMaK8lxX85JKJJkTAVD
Xnoj6IV3Un2k88xGd5t1UlRzVWkI5YQIWAsccMtAvJI+WJX1klNa///9f+qdNMvf
/0phv9tyYfzb2fckUbUDUzc0N8Mne4PdiFkoXNxW60Cy4bA/l57cOM+yghTdXib+
w1VZ4qRbEAOx8kwRfTGGrKS9hxhTVMe8iDm9r0js/vLqAbwv0/4rY0pNKBMESbHe
KctPIHORzypvRGtx2D8bHJVl2TG5OMfJ3JR6MaafOppQ0H0EU38dw/aagQDUjCUV
nO4AXcez/t+xlg3nEBRoJfa0FvpSExQPNcEI+SSRNevshQgly23BZJaf1IPBUX7/
s4xyp0KBf88nfYqCm4vehjW27z2WxclAhYO0elqD9kPT1Oi53Smkwp0vGIbICfin
CgbIVH1WlhL7baBnpdNEWOt7LifNe9UJE2q/rJljr8tYXVng/GU=
=Z85X
—–END PGP SIGNATURE—–


