Learn extra at:
Editor’s take: Intel’s grand comeback will seemingly take a bit extra time than initially anticipated. The CPU maker is clearly combating each {hardware} design and software program growth, and prospects are left stranded in a sea of reliability points, microcode updates, and safety flaws as a consequence.
Like many different IT distributors and software program builders, Intel has lengthy been releasing new safety patches similtaneously Microsoft’s Patch Tuesday. This month’s collection of updates is designed to shut doubtlessly harmful bugs affecting each hardware and software merchandise throughout a number of generations of CPU, GPU, and built-in GPU options.
Beginning with the software program merchandise, there was a single security vulnerability found within the Endurance Gaming Mode software program, which might be exploited to realize larger entry privileges on a system. The medium-rated flaw is mounted within the newest variations of the real-time monitoring utility for laptops based mostly on Intel chips.
The biggest batch of safety flaws mounted this month was found in Intel’s graphics drivers, for each built-in GPUs and discrete Arc playing cards. Intel’s advisory lists ten totally different “potential” safety vulnerabilities with a excessive severity score, which might be exploited to realize privileged entry, carry methods down by way of a DDoS assault, or entry delicate info. Newer driver releases ought to repair these high-severity graphics driver vulnerabilities.
Bugged drivers have an effect on graphics architectures built-in in a number of Intel processors, starting from the Sixth-gen Intel Core CPU household to the most recent Core Extremely chips. The troubled Arrow Lake microarchitecture is affected as properly, in fact. Moreover, Intel launched new bugfix drivers for its Knowledge Middle GPU Flex collection (140, 170).
Final however not least, Intel needed to launch a few firmware updates this month to repair some medium-rated points within the Core Extremely processors. These specific {hardware} bugs have an effect on the Integrated Connectivity I/O interface in sure Core Extremely CPUs, which can enable escalation of entry privileges if correctly exploited.
Core Extremely processors might additionally disclose delicate info due to two distinct vulnerabilities, which Intel mounted with new microcode updates for the Core Extremely 5, 7, and 9 CPU collection for cell, desktop, and embedded methods. Certainly one of these bugs (CVE-2025-20012) was found internally by Intel workers, whereas the opposite one (CVE-2025-24495) was reported by safety researchers from the VUSec group at VU Amsterdam.