Patchday: Intel patches dozens of security vulnerabilities

Intel also held a patch day and published 30 security advisories with updates. Seven of these are high-risk.

listen Print view
Intel headquarters in Santa Clara, 2023

(Image: Christof Windeck/heise medien)

3 min. read

Intel also published a series of security advisories on Wednesday night. Of the 30 security advisories, seven address vulnerabilities that the chip manufacturer classifies as high-risk. Admins and users should promptly apply the available updates.

Among others, the Intel PROset / Wireless WiFi Software stands out. It contains six security vulnerabilities that allow attackers to enable denial-of-service. The vulnerabilities CVE-2025-35971, CVE-2025-30255, CVE-2025-35963, and CVE-2025-33029 have a CVSS4 score of 8.3, classifying them as “high” risk. Various Intel WiFi products and processors with integrated wireless functions are affected; the driver for Windows in version 23.160 and newer versions fix the security flaws. They are available for download on Intel's download page.

Intel's firmware and software for Intel's graphics hardware also contain partly high-risk security flaws. Attackers can exploit a vulnerability in the firmware for Intel's Arc B-series GPUs and in the drivers for Intel Arc graphics to escalate their privileges within the system (CVE-2025-32091, CVSS4 8.4, risk “high”). Further vulnerabilities in the drivers for Intel's Arc, Arc Pro, and Iris Xe graphics modules also allow privilege escalation (CVE-2025-31647, CVSS4 5.4, risk “medium”) or denial of service (CVE-2025-25216, CVSS4 2.0, risk “low”). Intel provides the update to driver version 32.0.101.6913 for Intel Arc and Iris Xe. For Intel Arc Pro, version 32.0.101.6862 is available. Intel also recommends updating the Intel LTS Kernel Software to the current version.

Intel's UEFI Reference Platform can be exploited for privilege escalation or denial-of-service attacks. This affects Intel Xeon 6 with E-cores (Sierra Forest) and with P-cores (Granite Rapids). System vendors have access to the latest updates and should distribute them to customers. (CVE-2025-30185, CVSS4 8.3, risk “high”).

Videos by heise

Further security advisories that admins should consider in their update planning:

Intel has published 23 further vulnerability advisories in its Security Center. IT administrators should check if they are using vulnerable products and install the provided updates.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.