Patchday: Gaps in Intel software and drivers plugged
Security updates close several vulnerabilities in network drivers and Intel's Slim Bootloader, among others.
(Image: AFANASEV IVAN/Shutterstock.com)
Attackers can attack computers with Intel hardware and software. If attacks are successful, they can generate denial of service (DoS) states, among other things, which usually lead to crashes.
Attacks possible
Admins can find a list of the affected software and vulnerable drivers in the security section of the Intel website. There are also references to the secured versions. The majority of the vulnerabilities are classified as “medium”. In most cases, attackers can gain higher user rights after successful attacks. However, this often requires local access.
This works, for example, via two vulnerabilities (CVE-2025-20095, CVE-2025-20043) in the RealSense SDK. It is not yet clear how attacks could actually take place. There are currently no reports of ongoing attacks. Admins should nevertheless patch quickly.
However, there are also some gaps with a “high” threat level. This concerns the Slim Bootloader (CVE-2025-20083), for example. Here, too, a local attacker can upgrade his rights. Two vulnerabilities in the PROSet/Wirelesse Wi-Fi software for Windows can serve as starting points for DoS attacks.
Videos by heise
In addition, the developers have closed CPU gaps that recently became known which attackers can use to read passwords, for example.
(des)