Patchday: Gaps in Intel software and drivers plugged

Security updates close several vulnerabilities in network drivers and Intel's Slim Bootloader, among others.

listen Print view
Progress bar under "Update" lettering

(Image: AFANASEV IVAN/Shutterstock.com)

1 min. read

Attackers can attack computers with Intel hardware and software. If attacks are successful, they can generate denial of service (DoS) states, among other things, which usually lead to crashes.

Admins can find a list of the affected software and vulnerable drivers in the security section of the Intel website. There are also references to the secured versions. The majority of the vulnerabilities are classified as “medium”. In most cases, attackers can gain higher user rights after successful attacks. However, this often requires local access.

This works, for example, via two vulnerabilities (CVE-2025-20095, CVE-2025-20043) in the RealSense SDK. It is not yet clear how attacks could actually take place. There are currently no reports of ongoing attacks. Admins should nevertheless patch quickly.

However, there are also some gaps with a “high” threat level. This concerns the Slim Bootloader (CVE-2025-20083), for example. Here, too, a local attacker can upgrade his rights. Two vulnerabilities in the PROSet/Wirelesse Wi-Fi software for Windows can serve as starting points for DoS attacks.

Videos by heise

In addition, the developers have closed CPU gaps that recently became known which attackers can use to read passwords, for example.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.