[CIAD-2026-0024] Multiple Vulnerabilities in Intel Products

By Published On: May 19, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Intel Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: High


Software Affected


Intel Vision software

Intel® EMA software

Display Virtualization for Windows OS driver software

Intel® 800 Series Ethernet Linux kernel drivers

Intel® Slim Bootloader

Intel® Core™ Ultra Series 2

12th Gen Intel® Core™ Processors

13th Gen Intel® Core™ Processors

11th Gen Intel® Core™ Processors

10th Gen Intel® Core™ Processors

Intel® Pentium® Gold Processors

Intel® Celeron® Processors

Intel® Celeron® 6305E/RE

Intel Atom® E3900 Processors

Intel® Xeon® E Family

Intel® Xeon® D Family

Intel® Xeon® W embedded SKUs

Intel® Core™ i3 embedded SKUs

Intel® Core™ i5 embedded SKUs

Intel® Core™ i7 embedded SKUs

Intel® NPU Driver for Linux

Intel® NPU Driver for Windows

Intel® Core™ Ultra 200S Series Processors (Arrow Lake)

Intel® Core™ Ultra Processors Series 2 (Lunar Lake)

Intel® Core™ Ultra Processors Series 3 Panther Lake H

Intel® Data Center Graphics Driver for VMware ESXi software

Intel® QAT software drivers for Windows

Overview


Multiple vulnerabilities have been identified in various Intel products that could allow an attacker to gain elevated privileges, obtain sensitive information and cause denial of service on the targeted system.


Target Audience:

Individuals and organizations using the above-mentioned Intel products.


Risk Assessment:

High risk of full System Compromise, System Instability or Sensitive Information Disclosure.


Impact Assessment:

Potential unauthorized access to sensitive information, privilege escalation or disruption of system operations.


Description


Intel Corporation products are processors, chipsets, firmware, and computing technologies used in PCs, servers, and enterprise systems.


Multiple vulnerabilities have been reported in Intel Products due to Improper Input Validation, Improper buffer restrictions, Improper Check for Unusual or Exceptional Conditions, Use after free, Integer overflow, Classic Buffer Overflow, Incorrect Default Permissions, Shared Microarchitectural Predictor State that Influences Transient Execution, Out-of-bounds Write, Out-of-bounds Read, Untrusted Pointer Dereference, NULL Pointer Dereference, Divide By Zero, Unchecked Return Value.


Successful exploitation of these vulnerabilities could allow attackers to gain elevated privileges, obtain sensitive information and cause denial of service on the targeted system.




Solution


Apply appropriate security updates as mentioned in the Intel Security updates:  

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01457.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01434.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01430.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01426.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01424.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01420.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01402.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html


Vendor Information


Intel

https://www.intel.com/content/www/us/en/security-center/default.html


References


 

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01457.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01434.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01430.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01426.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01424.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01420.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01402.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html


CVE Name

CVE-2026-20887

CVE-2025-35990

CVE-2025-36510

CVE-2025-27723

CVE-2026-20753

CVE-2026-20754

CVE-2026-20718

CVE-2025-35979

CVE-2026-20794

CVE-2026-20879

CVE-2026-20751

CVE-2026-20767

CVE-2026-20738

CVE-2026-20714

CVE-2026-20717

CVE-2026-20782

CVE-2026-20905

CVE-2026-20771

CVE-2026-20881

CVE-2026-20914

CVE-2026-20793




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoMfdoACgkQ3jCgcSdc

ys9ZYA/+Jj54xYL7WIs8oMqw8i7Rhpv6fG5qWqBsV2RJS5eNOGj6OhO05kA50WZC

g11AVfjSC3re+qR4watHnVqne7ZUjKPAGV1iMCEmHijgSvX8Tjo0VVCvgRzuBhzd

uq03OxImgAbBVfwFEFwcga8m9Ych5n+iONGc0wUYCszHU+gGFkdNvFNfeOl0CAtE

PE1Srrebyzcb2xIBWNBhIpaneAJih6saHurFrol+o/HLWFO1rgFDQlYdL5TBrFAz

HRIadAl1HMbHX+4jMMqnQ80VxKFHhaVvLDyK1/msh4Wh9SHpaHtf/n1KUcLfWCCz

Y/KXit6suaXZ4Y9wvS6NNOadcIwHIDC0tuCLZybet7v5a+NsTGmERgdOBmFLyImh

3HNfweEnRj/0pVaVrwuVKC+yk4k3w36ydiVpkgeHQCVV5/zArBBasctq6QVDF/C/

i5KzwjLuDbvToNI07nJgK5KXze2FOPpHPrNxCjtry7RRzCLnO8Wk62yFy9Y9heFY

wtSVfNycXxj11pfUOszEpXy4Uu8Ki0tdqBeUW8eEmcSyoeN+dM2ltFZ5djbi8Mv/

xi0bKh4m0Ivvx2xSUBRcmAcld6ouLkNxdTAWpX6LnpY24ypGrA66Fgh7lhGmmUR9

cxwPdAJNm7Tjs5Wu8isPcuFkeXDcaYUtulvSvOZJ78HrrFArWFM=

=uS48

—–END PGP SIGNATURE—–

Share this article