Two local denial of service vulnerabilities in Intel processors



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-20103
CVE-2025-20054
CWE-ID CWE-399
CWE-248
Exploitation vector Local
Public exploit N/A
Vulnerable software
12th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Pentium Gold Processor Series
Hardware solutions / Firmware

Intel Celeron Processors
Hardware solutions / Firmware

Intel Core Ultra family
Hardware solutions / Firmware

5th Generation Intel Xeon Scalable processors
Hardware solutions / Firmware

Intel Xeon W Processors
Hardware solutions / Firmware

Intel Xeon E Processors
Hardware solutions / Firmware

13th Generation Intel Core Processors
Hardware solutions / Firmware

14th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Xeon CPU Max Series processors
Hardware solutions / Firmware

4th Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

4th Generation Intel Xeon Platinum processors
Hardware solutions / Firmware

4th Generation Intel Xeon Gold Processors
Hardware solutions / Firmware

4th Generation Intel Xeon Silver Processors
Hardware solutions / Firmware

4th Generation Intel Xeon Bronze Processors
Hardware solutions / Firmware

Intel Core Ultra 200S Series Processor
Hardware solutions / Other hardware appliances

5th Generation Intel Xeon Platinum processor
Hardware solutions / Other hardware appliances

5th Generation Intel Xeon Gold Processor
Hardware solutions / Other hardware appliances

5th Generation Intel Xeon Silver Processor
Hardware solutions / Other hardware appliances

5th Generation Intel Xeon Bronze Processor
Hardware solutions / Other hardware appliances

Intel Core Ultra Processors Series 2
Hardware solutions / Other hardware appliances

Vendor Intel

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU109426

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-20103

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient resource pool in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

12th Generation Intel Core Processors: All versions

Intel Pentium Gold Processor Series: All versions

Intel Celeron Processors: All versions

Intel Core Ultra 200S Series Processor: All versions

Intel Core Ultra family: All versions

5th Generation Intel Xeon Scalable processors: All versions

5th Generation Intel Xeon Platinum processor: All versions

5th Generation Intel Xeon Gold Processor: All versions

5th Generation Intel Xeon Silver Processor: All versions

5th Generation Intel Xeon Bronze Processor: All versions

Intel Xeon W Processors: All versions

Intel Xeon E Processors: All versions

Intel Core Ultra Processors Series 2: All versions

13th Generation Intel Core Processors: All versions

14th Generation Intel Core Processors: All versions

Intel Xeon CPU Max Series processors: All versions

4th Generation Intel Xeon Scalable Processors: All versions

4th Generation Intel Xeon Platinum processors: All versions

4th Generation Intel Xeon Gold Processors: All versions

4th Generation Intel Xeon Silver Processors: All versions

4th Generation Intel Xeon Bronze Processors: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Uncaught Exception

EUVDB-ID: #VU109427

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-20054

CWE-ID: CWE-248 - Uncaught Exception

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an uncaught exception in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

12th Generation Intel Core Processors: All versions

Intel Pentium Gold Processor Series: All versions

Intel Celeron Processors: All versions

Intel Core Ultra 200S Series Processor: All versions

Intel Core Ultra family: All versions

5th Generation Intel Xeon Scalable processors: All versions

5th Generation Intel Xeon Platinum processor: All versions

5th Generation Intel Xeon Gold Processor: All versions

5th Generation Intel Xeon Silver Processor: All versions

5th Generation Intel Xeon Bronze Processor: All versions

Intel Xeon W Processors: All versions

Intel Xeon E Processors: All versions

Intel Core Ultra Processors Series 2: All versions

13th Generation Intel Core Processors: All versions

14th Generation Intel Core Processors: All versions

Intel Xeon CPU Max Series processors: All versions

4th Generation Intel Xeon Scalable Processors: All versions

4th Generation Intel Xeon Platinum processors: All versions

4th Generation Intel Xeon Gold Processors: All versions

4th Generation Intel Xeon Silver Processors: All versions

4th Generation Intel Xeon Bronze Processors: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###