SB2025112121 - Multiple vulnerabilities in Intel CIP Software



SB2025112121 - Multiple vulnerabilities in Intel CIP Software

Published: November 21, 2025

Security Bulletin ID SB2025112121
Severity
Medium
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Improper privilege management (CVE-ID: CVE-2025-24838)

The vulnerability allows a remote attacker to escalate privileges.

The vulnerability exists due to improper privilege management. A remote user can escalate privileges.


2) Input validation error (CVE-ID: CVE-2025-24299)

The vulnerability allows a remote attacker can escalate privileges on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


3) External Control of File Name or Path (CVE-ID: CVE-2025-20614)

The vulnerability allows a local user to read arbitrary files.

The vulnerability exists due to application allows an attacker to control path of the files to delete. A local administrator can gain access to sensitive information and escalate privileges on the system.


4) Untrusted search path (CVE-ID: CVE-2025-20050)

The vulnerability allows a local user to execute arbitrary code on the system.

The vulnerability exists due to application allows an attacker to control path of the files to delete. A local user can execute arbitrary code on the target system.


5) Improper privilege management (CVE-ID: CVE-2025-24863)

The vulnerability allows a remote attacker to gain access to sensitive information on the system.

The vulnerability exists due to improper privilege management. A remote user can enable data exposure.


6) Protection Mechanism Failure (CVE-ID: CVE-2025-24834)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. A remote attacker on the local network can bypass implemented security restrictions and gain access to sensitive information on the system.


7) Protection Mechanism Failure (CVE-ID: CVE-2025-24848)

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. A local user can bypass implemented security restrictions and elevate privileges on the system.


8) Input validation error (CVE-ID: CVE-2025-24847)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input. A remote administrator can pass specially crafted input to the application and enable data exposure.


9) Improper access control (CVE-ID: CVE-2025-24516)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker on the local network can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.


10) Arbitrary file upload (CVE-ID: CVE-2025-24862)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote administrator can upload a malicious file and execute it on the server.


11) Improper privilege management (CVE-ID: CVE-2025-24307)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper privilege management. A remote user can enable data manipulation.


12) Improper access control (CVE-ID: CVE-2025-24314)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote administrator can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.