Intel® Security Updates – 11 February 2026

Intel has released security updates to address several vulnerabilities in multiple Intel products.

The addressed vulnerabilities could allow the attacker to gain elevated privileges, obtain sensitive information, or perform denial-of-service attacks on the affected product.

Samples of the addressed vulnerabilities:

1. Intel® AMT and Intel® Standard Manageability Out-of-bounds Write in The Firmware Via Network Access Vulnerability (CVE-2025-32008):

  • CVSS: 8.6
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Denial of Service

2. Improper Input Validation in The Intel® Server Firmware Update Utility Vulnerability (CVE-2025-25210):

  • CVSS: 8.2
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Consequences: Gain Privileges

Sample of the affected products:

  • Intel® AMT and Intel® Standard Manageability.
  • Intel® Server Firmware Update Utility.
  • Intel® Xeon® processors.
  • Intel® 800 Series Ethernet.
  • Intel® Core™ processors.
Vulnerabilities
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Intel Security Advisory

References