Intel

Vendor security scorecard – 224 CVEs in the selected period

Period: 30d 90d 6m 1y All
Risk 232
224
CVEs
1
Critical
51
High
0
KEV
0
PoC
42
Unpatched C/H
14.7%
Patch Rate
0.0%
Avg EPSS

Severity Breakdown

CRITICAL
1
HIGH
51
MEDIUM
147
LOW
20

Monthly CVE Trend

Top Risky CVEs

CVE Summary Severity CVSS EPSS Priority Signals
CVE-2025-24325 Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via. Rated critical severity (CVSS 9.3), this vulnerability is low attack complexity. No vendor patch available. CRITICAL 9.3 0.0% 47
No patch
CVE-2025-22843 Incorrect execution-assigned permissions for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via local. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-24484 Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-24486 Improper input validation in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of privilege via. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-22836 Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-24303 Improper check for unusual or exceptional conditions in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-22893 Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-25273 Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of. Rated high severity (CVSS 8.8). No vendor patch available. HIGH 8.8 0.0% 44
No patch
CVE-2025-21094 Improper input validation in the UEFI firmware DXE module for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to potentially enable escalation of privilege via local access. Rated high severity (CVSS 8.7), this vulnerability is low attack complexity. No vendor patch available. HIGH 8.7 0.1% 44
No patch
CVE-2025-24308 Improper input validation in the UEFI firmware error handler for the Intel(R) Server D50DNP and M50FCP may allow a privileged user to potentially enable escalation of privilege via local access. Rated high severity (CVSS 8.7). No vendor patch available. HIGH 8.7 0.1% 44
No patch
CVE-2025-20100 Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local. Rated high severity (CVSS 8.7). No vendor patch available. HIGH 8.7 0.1% 44
No patch
CVE-2025-20082 Time-of-check time-of-use race condition in the UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to enable escalation of privilege via. Rated high severity (CVSS 8.7). No vendor patch available. HIGH 8.7 0.1% 44
No patch
CVE-2025-20004 Insufficient control flow management in the Alias Checking Trusted Module for some Intel(R) Xeon(R) 6 processor E-Cores firmware may allow a privileged user to potentially enable escalation of. Rated high severity (CVSS 8.5). No vendor patch available. HIGH 8.5 0.0% 43
No patch
CVE-2025-23241 Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable denial of service via. Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available. HIGH 8.4 0.0% 42
No patch
CVE-2025-20032 Improper input validation for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow a privileged user to potentially enable denial of service via local access. Rated high severity (CVSS 8.3), this vulnerability is low attack complexity. No vendor patch available. HIGH 8.3 0.1% 42
No patch

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy