SB2025112121 - Multiple vulnerabilities in Intel CIP Software
Published: November 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Improper privilege management (CVE-ID: CVE-2025-24838)
The vulnerability allows a remote attacker to escalate privileges.
The vulnerability exists due to improper privilege management. A remote user can escalate privileges.
2) Input validation error (CVE-ID: CVE-2025-24299)
The vulnerability allows a remote attacker can escalate privileges on the target system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
3) External Control of File Name or Path (CVE-ID: CVE-2025-20614)
The vulnerability allows a local user to read arbitrary files.
The vulnerability exists due to application allows an attacker to control path of the files to delete. A local administrator can gain access to sensitive information and escalate privileges on the system.
4) Untrusted search path (CVE-ID: CVE-2025-20050)
The vulnerability allows a local user to execute arbitrary code on the system.
The vulnerability exists due to application allows an attacker to control path of the files to delete. A local user can execute arbitrary code on the target system.
5) Improper privilege management (CVE-ID: CVE-2025-24863)
The vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to improper privilege management. A remote user can enable data exposure.
6) Protection Mechanism Failure (CVE-ID: CVE-2025-24834)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. A remote attacker on the local network can bypass implemented security restrictions and gain access to sensitive information on the system.
7) Protection Mechanism Failure (CVE-ID: CVE-2025-24848)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. A local user can bypass implemented security restrictions and elevate privileges on the system.
8) Input validation error (CVE-ID: CVE-2025-24847)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote administrator can pass specially crafted input to the application and enable data exposure.
9) Improper access control (CVE-ID: CVE-2025-24516)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker on the local network can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.
10) Arbitrary file upload (CVE-ID: CVE-2025-24862)
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote administrator can upload a malicious file and execute it on the server.
11) Improper privilege management (CVE-ID: CVE-2025-24307)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper privilege management. A remote user can enable data manipulation.
12) Improper access control (CVE-ID: CVE-2025-24314)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote administrator can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.