wid-sec-w-2025-1030
Vulnerability from csaf_certbund
Published
2025-05-13 22:00
Modified
2025-07-08 22:00
Summary
Intel Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erhöhen, einen Denial-of-Service-Zustand herbeizuführen und vertrauliche Informationen preiszugeben.
Betroffene Betriebssysteme
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und vertrauliche Informationen preiszugeben.", "title": "Angriff" }, { "category": "general", "text": "- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1030 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1030.json" }, { "category": "self", "summary": "WID-SEC-2025-1030 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1030" }, { "category": "external", "summary": "Intel Core Ultra Processors CNVi Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01180.html" }, { "category": "external", "summary": "2025.2 IPU, Intel Processor Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html" }, { "category": "external", "summary": "2025.2 IPU - Intel Processor Indirect Branch Predictor Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html" }, { "category": "external", "summary": "Intel Xeon 6 processor with E-cores SGX and TDX Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01268.html" }, { "category": "external", "summary": "Intel Xeon 6 processor E-Cores with Alias Checking Trusted Module Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01273.html" }, { "category": "external", "summary": "Intel Xeon 6 processor with E-cores Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html" }, { "category": "external", "summary": "Intel Slim Bootloader Advisory vom 2025-05-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html" }, { "category": "external", "summary": "Google Cloud Platform Security Bulletin GCP-2025-025 vom 2025-05-14", "url": "https://cloud.google.com/support/bulletins#gcp-2025-025" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04858 rev.1 vom 2025-05-13", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04858en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-048 vom 2025-05-13", "url": "https://www.dell.com/support/kbdoc/de-de/000272449/dsa-2025-048" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-156 vom 2025-05-13", "url": "https://www.dell.com/support/kbdoc/de-de/000320934/dsa-2025-156-security-update-for-dell-poweredge-server-for-intel-2025-security-advisories-2025-2-ipu" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04860 rev.1 vom 2025-05-13", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04860en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-195071 vom 2025-05-14", "url": "https://support.lenovo.com/us/en/product_security/LEN-195071" }, { "category": "external", "summary": "PoC f\u00fcr CVE-2024-45332 vom 2025-05-14", "url": "https://comsec.ethz.ch/research/microarch/branch-privilege-injection/" }, { "category": "external", "summary": "Debian Security Advisory DLA-4170 vom 2025-05-18", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00021.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1567-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15093-1 vom 2025-05-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01650-1 vom 2025-05-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020877.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01651-1 vom 2025-05-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6G75W2R3WRICVZLBNWSHQ44DL3TMTL6V/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5924 vom 2025-05-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00087.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2025-ABF317121E vom 2025-05-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-abf317121e" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2025-E5D3928F2C vom 2025-05-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-e5d3928f2c" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF04024 vom 2025-04-11", "url": "https://support.hp.com/de-de/document/ish_12559622-12559652-16/HPSBHF04024" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7535-1 vom 2025-05-27", "url": "https://ubuntu.com/security/notices/USN-7535-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01651-2 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020928.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2872 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2872.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF04026 vom 2025-04-11", "url": "https://support.hp.com/us-en/document/ish_12568527-12568549-16/HPSBHF04026" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20410-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021549.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20424-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021589.html" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-200962 vom 2025-07-09", "url": "https://support.lenovo.com/us/en/product_security/LEN-200962" } ], "source_lang": "en-US", "title": "Intel Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-08T22:00:00.000+00:00", "generator": { "date": "2025-07-09T06:01:50.149+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1030", "initial_release_date": "2025-05-13T22:00:00.000+00:00", "revision_history": [ { "date": "2025-05-13T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-05-14T22:00:00.000+00:00", "number": "2", "summary": "PoC aufgenommen" }, { "date": "2025-05-15T22:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: EUVD-2025-14567" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian, SUSE und openSUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP und Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE, Amazon und HP aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von LENOVO aufgenommen" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T043182", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "category": "product_name", "name": "Dell PowerEdge", "product": { "name": "Dell PowerEdge", "product_id": "T019535", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Google Cloud Platform", "product": { "name": "Google Cloud Platform", "product_id": "393401", "product_identification_helper": { "cpe": "cpe:/a:google:cloud_platform:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T031288", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } }, { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T032784", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "product_name", "name": "Computer" } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T027705", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } }, { "category": "product_name", "name": "HPE Synergy", "product": { "name": "HPE Synergy", "product_id": "T019820", "product_identification_helper": { "cpe": "cpe:/h:hpe:synergy:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "CNVi", "product": { "name": "Intel Prozessor CNVi", "product_id": "T043596", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:cnvi" } } }, { "category": "product_version", "name": "Xeon 6 E-cores", "product": { "name": "Intel Prozessor Xeon 6 E-cores", "product_id": "T043597", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:xeon_6_e-cores" } } }, { "category": "product_version", "name": "Slim Bootloader", "product": { "name": "Intel Prozessor Slim Bootloader", "product_id": "T043598", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:slim_bootloader" } } }, { "category": "product_name", "name": "Intel Prozessor", "product": { "name": "Intel Prozessor", "product_id": "T043599", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:-" } } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Lenovo BIOS", "product": { "name": "Lenovo BIOS", "product_id": "T033443", "product_identification_helper": { "cpe": "cpe:/h:lenovo:bios:-" } } }, { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T026557", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-20047", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557", "T043596" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20047" }, { "cve": "CVE-2024-48869", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T043597", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2024-48869" }, { "cve": "CVE-2025-20004", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T043597", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20004" }, { "cve": "CVE-2025-20100", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T043597", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20100" }, { "cve": "CVE-2025-20083", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T043598", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20083" }, { "cve": "CVE-2025-20054", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20054" }, { "cve": "CVE-2025-20103", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20103" }, { "cve": "CVE-2024-43420", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2024-43420" }, { "cve": "CVE-2024-45332", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2024-45332" }, { "cve": "CVE-2025-20623", "product_status": { "known_affected": [ "T031288", "T032784", "393401", "T033443", "74185", "T019535", "T043599", "T019820", "2951", "T002207", "T027705", "T000126", "T027843", "T043182", "398363", "T026557" ] }, "release_date": "2025-05-13T22:00:00.000+00:00", "title": "CVE-2025-20623" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…