Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2025-20103 CVE-2025-20054 |
CWE-ID | CWE-399 CWE-248 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
12th Generation Intel Core Processors Hardware solutions / Firmware Intel Pentium Gold Processor Series Hardware solutions / Firmware Intel Celeron Processors Hardware solutions / Firmware Intel Core Ultra family Hardware solutions / Firmware 5th Generation Intel Xeon Scalable processors Hardware solutions / Firmware Intel Xeon W Processors Hardware solutions / Firmware Intel Xeon E Processors Hardware solutions / Firmware 13th Generation Intel Core Processors Hardware solutions / Firmware 14th Generation Intel Core Processors Hardware solutions / Firmware Intel Xeon CPU Max Series processors Hardware solutions / Firmware 4th Generation Intel Xeon Scalable Processors Hardware solutions / Firmware 4th Generation Intel Xeon Platinum processors Hardware solutions / Firmware 4th Generation Intel Xeon Gold Processors Hardware solutions / Firmware 4th Generation Intel Xeon Silver Processors Hardware solutions / Firmware 4th Generation Intel Xeon Bronze Processors Hardware solutions / Firmware Intel Core Ultra 200S Series Processor Hardware solutions / Other hardware appliances 5th Generation Intel Xeon Platinum processor Hardware solutions / Other hardware appliances 5th Generation Intel Xeon Gold Processor Hardware solutions / Other hardware appliances 5th Generation Intel Xeon Silver Processor Hardware solutions / Other hardware appliances 5th Generation Intel Xeon Bronze Processor Hardware solutions / Other hardware appliances Intel Core Ultra Processors Series 2 Hardware solutions / Other hardware appliances |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU109426
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-20103
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient resource pool in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versions12th Generation Intel Core Processors: All versions
Intel Pentium Gold Processor Series: All versions
Intel Celeron Processors: All versions
Intel Core Ultra 200S Series Processor: All versions
Intel Core Ultra family: All versions
5th Generation Intel Xeon Scalable processors: All versions
5th Generation Intel Xeon Platinum processor: All versions
5th Generation Intel Xeon Gold Processor: All versions
5th Generation Intel Xeon Silver Processor: All versions
5th Generation Intel Xeon Bronze Processor: All versions
Intel Xeon W Processors: All versions
Intel Xeon E Processors: All versions
Intel Core Ultra Processors Series 2: All versions
13th Generation Intel Core Processors: All versions
14th Generation Intel Core Processors: All versions
Intel Xeon CPU Max Series processors: All versions
4th Generation Intel Xeon Scalable Processors: All versions
4th Generation Intel Xeon Platinum processors: All versions
4th Generation Intel Xeon Gold Processors: All versions
4th Generation Intel Xeon Silver Processors: All versions
4th Generation Intel Xeon Bronze Processors: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109427
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-20054
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an uncaught exception in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versions12th Generation Intel Core Processors: All versions
Intel Pentium Gold Processor Series: All versions
Intel Celeron Processors: All versions
Intel Core Ultra 200S Series Processor: All versions
Intel Core Ultra family: All versions
5th Generation Intel Xeon Scalable processors: All versions
5th Generation Intel Xeon Platinum processor: All versions
5th Generation Intel Xeon Gold Processor: All versions
5th Generation Intel Xeon Silver Processor: All versions
5th Generation Intel Xeon Bronze Processor: All versions
Intel Xeon W Processors: All versions
Intel Xeon E Processors: All versions
Intel Core Ultra Processors Series 2: All versions
13th Generation Intel Core Processors: All versions
14th Generation Intel Core Processors: All versions
Intel Xeon CPU Max Series processors: All versions
4th Generation Intel Xeon Scalable Processors: All versions
4th Generation Intel Xeon Platinum processors: All versions
4th Generation Intel Xeon Gold Processors: All versions
4th Generation Intel Xeon Silver Processors: All versions
4th Generation Intel Xeon Bronze Processors: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.