Intel Security Updates – 12 November 2025

Intel has released security updates to address several vulnerabilities affecting multiple Intel products.

The addressed vulnerabilities could allow the attacker to gain elevated privileges, perform denial-of-service attacks, obtain sensitive information, or execute arbitrary code and gain access to the affected systems.

Sample of the addressed vulnerabilities:

1. Intel Computing Improvement Program (CIP) Improper Privilege Management Vulnerability (CVE-2025-24838):

  • CVSS: 8.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Privileges

2. Intel PROSet/Wireless Wi-Fi Software Out-of-Bounds Write Vulnerability (CVE-2025-35971):

  • CVSS: 8.2
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Denial of Service

Sample of the affected products:

  • Intel Server Configuration Utility software.
  • Intel Xeon® Processor D Family.
  • Intel Core™ Ultra Processor.
  • Intel SoC Thermal IPF Extension Provider software.
  • Intel PresentMon software.
Vulnerabilities
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Intel Security Advisory

References