CERTFR-2025-AVI-0993
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel les processeurs Intel Famille de processeurs Intel Xeon D sans les derniers correctifs de sécurité
Intel les processeurs Intel Sig Test Phoenix versions 5.1.x antérieures à 5.1.08
Intel les processeurs Intel Intel MPI Library pour Windows versions antérieures à 2021.16
Intel les processeurs Intel Intel oneAPI Math Kernel Library versions antérieures à 2025.2
Intel les processeurs Intel Intel DSA versions antérieures à 25.2
Intel les processeurs Intel Intel Distribution pour Python versions antérieures à 2025.2.0
Intel les processeurs Intel Intel Killer versions antérieures à 40.25.509.1465
Intel les processeurs Intel Intel Processor Identification Utility versions antérieures à 8.0.43
Intel les processeurs Intel Intel Rapid Storage Technology versions 18.x antérieures à 18.1.1042
Intel les processeurs Intel Intel Gaudi versions antérieures à 1.21.0
Intel les processeurs Intel ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions antérieures à 1.5.1.0
Intel les processeurs Intel Intel Server Configuration Utility versions antérieures à 16.0.12
Intel les processeurs Intel Intel QAT Windows versions antérieures à 2.6.0
Intel les processeurs Intel Famille de processeurs Intel Core Ultra sans les derniers correctifs de sécurité
Intel les processeurs Intel Intel PresentMon versions antérieures à 2.3.1
Intel les processeurs Intel Intel oneAPI HPC Toolkit versions antérieures à 2025.2
Intel les processeurs Intel Intel SoC Thermal IPF Extension Provider versions antérieures à 03.03.1002
Intel les processeurs Intel Intel Iris Xe graphics versions antérieures à 32.0.101.6913
Intel les processeurs Intel Intel CIP versions antérieures à WIN_DCA_2.4.0.11001
Intel les processeurs Intel Famille de processeurs Intel Xeon 6 sans les derniers correctifs de sécurité
Intel les processeurs Intel Sig Test versions 6.1.x antérieures à 6.1.08
Intel les processeurs Intel Intel HPC Toolkit versions antérieures à 2025.1.0
Intel les processeurs Intel ITT API versions antérieures à 3.25.4
Intel les processeurs Intel Display Virtualization pour Windows OS driver versions antérieures à 1797
Intel les processeurs Intel Intel oneAPI Base Toolkit versions antérieures à 2025.1.0
Intel les processeurs Intel Intel Thread Director Visualizer versions antérieures à 1.1.1
Intel les processeurs Intel Intel® Graphics versions antérieures 25.22.1502.2
Intel les processeurs Intel FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions antérieures à 2025.0.1
Intel les processeurs Intel ACAT versions antérieures à 3.13
Intel les processeurs Intel Intel Arc graphics versions antérieures à 32.0.101.6913
Intel les processeurs Intel Intel VTune Profiler versions antérieures à 2025.1.0
Intel les processeurs Intel Intel SEL Viewer Utility software, toutes versions
Intel les processeurs Intel Intel System Support Utility pour Windows versions antérieures à 4.1.0
Intel les processeurs Intel Intel Arc Pro graphics versions antérieures à 32.0.101.6862
Intel les processeurs Intel Intel LTS kernel versions antérieures à lts-v6.12.24-linux-250501T040919Z
Intel les processeurs Intel Famille de processeurs Intel Core de 12e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Core de 11e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Intel Server Firmware Update Utility versions antérieures à 16.0.12
Intel les processeurs Intel Intel Neural Compressor versions antérieures à 3.4
Intel les processeurs Intel Intel OFU versions antérieures à 14.1.31
Intel les processeurs Intel Intel PROSet/Wireless Wi-Fi versions antérieures à 23.160
Intel les processeurs Intel Intel Rapid Storage Technology versions 20.x antérieures à 20.0.1021
References
Bulletin de sécurité Intel INTEL-SA-01380 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01337 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01356 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01365 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01366 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01360 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01400 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01386 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01355 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01374 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01331 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01373 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01376 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01394 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01304 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01392 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01334 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01362 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01364 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01375 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01303 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01377 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01382 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01398 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01328 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01327 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01378 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01388 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01361 2025-11-11 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01395 2025-11-11 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Famille de processeurs Intel Xeon D sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Sig Test Phoenix versions 5.1.x ant\u00e9rieures \u00e0 5.1.08",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.16",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2025.2",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 25.2",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2025.2.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer versions ant\u00e9rieures \u00e0 40.25.509.1465",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Processor Identification Utility versions ant\u00e9rieures \u00e0 8.0.43",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Rapid Storage Technology versions 18.x ant\u00e9rieures \u00e0 18.1.1042",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Gaudi versions ant\u00e9rieures \u00e0 1.21.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi RDMA driver (irdman) pour Intel 800 Series Ethernet versions ant\u00e9rieures \u00e0 1.5.1.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.12",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QAT Windows versions ant\u00e9rieures \u00e0 2.6.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core Ultra sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PresentMon versions ant\u00e9rieures \u00e0 2.3.1",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2025.2",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SoC Thermal IPF Extension Provider versions ant\u00e9rieures \u00e0 03.03.1002",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Iris Xe graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CIP versions ant\u00e9rieures \u00e0 WIN_DCA_2.4.0.11001",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Sig Test versions 6.1.x ant\u00e9rieures \u00e0 6.1.08",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel HPC Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "ITT API versions ant\u00e9rieures \u00e0 3.25.4",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Display Virtualization pour Windows OS driver versions ant\u00e9rieures \u00e0 1797",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2025.1.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.1.1",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics versions ant\u00e9rieures 25.22.1502.2",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "FPGA Support Package pour Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2025.0.1",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "ACAT versions ant\u00e9rieures \u00e0 3.13",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc graphics versions ant\u00e9rieures \u00e0 32.0.101.6913",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2025.1.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SEL Viewer Utility software, toutes versions",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel System Support Utility pour Windows versions ant\u00e9rieures \u00e0 4.1.0",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Pro graphics versions ant\u00e9rieures \u00e0 32.0.101.6862",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel LTS kernel versions ant\u00e9rieures \u00e0 lts-v6.12.24-linux-250501T040919Z",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core de 11e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Firmware Update Utility versions ant\u00e9rieures \u00e0 16.0.12",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Neural Compressor versions ant\u00e9rieures \u00e0 3.4",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.31",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless Wi-Fi versions ant\u00e9rieures \u00e0 23.160",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Rapid Storage Technology versions 20.x ant\u00e9rieures \u00e0 20.0.1021",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-30506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30506"
    },
    {
      "name": "CVE-2025-25216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25216"
    },
    {
      "name": "CVE-2025-30185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30185"
    },
    {
      "name": "CVE-2025-20065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20065"
    },
    {
      "name": "CVE-2025-24862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24862"
    },
    {
      "name": "CVE-2025-26402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26402"
    },
    {
      "name": "CVE-2025-31940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31940"
    },
    {
      "name": "CVE-2025-27725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27725"
    },
    {
      "name": "CVE-2025-31645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31645"
    },
    {
      "name": "CVE-2025-31948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31948"
    },
    {
      "name": "CVE-2025-31937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31937"
    },
    {
      "name": "CVE-2025-20056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20056"
    },
    {
      "name": "CVE-2025-26694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26694"
    },
    {
      "name": "CVE-2025-27249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27249"
    },
    {
      "name": "CVE-2025-35963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-35963"
    },
    {
      "name": "CVE-2025-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24512"
    },
    {
      "name": "CVE-2025-30518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30518"
    },
    {
      "name": "CVE-2025-35971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-35971"
    },
    {
      "name": "CVE-2025-24491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24491"
    },
    {
      "name": "CVE-2025-24842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24842"
    },
    {
      "name": "CVE-2025-24834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24834"
    },
    {
      "name": "CVE-2025-32037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32037"
    },
    {
      "name": "CVE-2025-24848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24848"
    },
    {
      "name": "CVE-2025-35968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-35968"
    },
    {
      "name": "CVE-2025-25059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25059"
    },
    {
      "name": "CVE-2025-32091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32091"
    },
    {
      "name": "CVE-2025-24314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24314"
    },
    {
      "name": "CVE-2025-32088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32088"
    },
    {
      "name": "CVE-2025-32038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32038"
    },
    {
      "name": "CVE-2025-24918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24918"
    },
    {
      "name": "CVE-2025-32449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32449"
    },
    {
      "name": "CVE-2025-27713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27713"
    },
    {
      "name": "CVE-2025-22391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22391"
    },
    {
      "name": "CVE-2025-32001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32001"
    },
    {
      "name": "CVE-2025-24838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24838"
    },
    {
      "name": "CVE-2025-26405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26405"
    },
    {
      "name": "CVE-2025-20622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20622"
    },
    {
      "name": "CVE-2025-24299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24299"
    },
    {
      "name": "CVE-2025-27710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27710"
    },
    {
      "name": "CVE-2025-31931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31931"
    },
    {
      "name": "CVE-2025-20614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20614"
    },
    {
      "name": "CVE-2025-30182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30182"
    },
    {
      "name": "CVE-2025-24307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24307"
    },
    {
      "name": "CVE-2025-24863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24863"
    },
    {
      "name": "CVE-2025-35972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-35972"
    },
    {
      "name": "CVE-2025-31647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31647"
    },
    {
      "name": "CVE-2025-27712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27712"
    },
    {
      "name": "CVE-2025-32446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32446"
    },
    {
      "name": "CVE-2025-24519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24519"
    },
    {
      "name": "CVE-2025-24516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24516"
    },
    {
      "name": "CVE-2025-33029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33029"
    },
    {
      "name": "CVE-2025-27246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27246"
    },
    {
      "name": "CVE-2025-35967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-35967"
    },
    {
      "name": "CVE-2025-30255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30255"
    },
    {
      "name": "CVE-2025-20050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20050"
    },
    {
      "name": "CVE-2025-31146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31146"
    },
    {
      "name": "CVE-2025-27711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27711"
    },
    {
      "name": "CVE-2025-30509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30509"
    },
    {
      "name": "CVE-2025-32732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32732"
    },
    {
      "name": "CVE-2025-24847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24847"
    },
    {
      "name": "CVE-2025-24327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24327"
    },
    {
      "name": "CVE-2025-20010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20010"
    },
    {
      "name": "CVE-2025-33000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33000"
    }
  ],
  "initial_release_date": "2025-11-12T00:00:00",
  "last_revision_date": "2025-11-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0993",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01380",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01380.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01337",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01337.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01356",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01356.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01365",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01365.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01366",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01366.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01360",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01360.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01400",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01400.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01386",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01386.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01355",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01355.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01374",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01374.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01331",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01331.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01373",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01376",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01376.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01394",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01394.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01304",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01304.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01392",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01392.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01334",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01334.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01362",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01362.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01364",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01364.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01375",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01375.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01303",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01303.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01377",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01377.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01382",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01382.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01398",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01328",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01327",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01327.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01378",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01378.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01388",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01388.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01361",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01361.html"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01395",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01395.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…