{"id":5538,"date":"2025-05-17T07:33:40","date_gmt":"2025-05-16T23:33:40","guid":{"rendered":"https:\/\/cicserver.com\/intel-releases-patches-to-fix-security-vulnerabilities-in-its-cpus-gpus-and-gaming-software\/"},"modified":"2025-05-17T07:33:40","modified_gmt":"2025-05-16T23:33:40","slug":"intel-releases-patches-to-fix-security-vulnerabilities-in-its-cpus-gpus-and-gaming-software","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/intel-releases-patches-to-fix-security-vulnerabilities-in-its-cpus-gpus-and-gaming-software\/","title":{"rendered":"Intel releases patches to fix security vulnerabilities in its CPUs, GPUs, and gaming software"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<p id=\"why-it-matters\"><strong>Editor&#8217;s take:<\/strong> Intel&#8217;s grand comeback will likely take a bit more time than initially expected. The CPU maker is clearly struggling with both hardware design and software development, and customers are left stranded in a sea of reliability issues, microcode updates, and security flaws as a consequence. <\/p>\n<p>Like many other IT vendors and software developers, Intel has long been releasing new security patches at the same time as Microsoft&#8217;s <a href=\"https:\/\/www.techspot.com\/news\/107181-latest-patch-tuesday-accidentally-removes-copilot-app-windows.html\">Patch Tuesday<\/a>. This month&#8217;s series of updates is designed to close potentially dangerous bugs affecting both <a href=\"https:\/\/www.pcgamer.com\/hardware\/processors\/intel-has-announced-a-load-of-new-bugs-afflicting-its-chips-and-this-time-its-not-just-cpus-but-also-gpus-that-are-involved-hooray\/\">hardware and software<\/a> products across several generations of CPU, GPU, and integrated GPU solutions.<\/p>\n<p>Starting with the software products, there was a <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-01254.html\">single security vulnerability<\/a> discovered in the Endurance Gaming Mode software, which could be exploited to gain higher access privileges on a system. The medium-rated flaw is fixed in the latest versions of the real-time monitoring application for laptops based on Intel chips.<\/p>\n<p>The largest batch of security flaws fixed this month was discovered in Intel&#8217;s graphics drivers, for both integrated GPUs and discrete Arc cards. <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-01253.html\">Intel&#8217;s advisory<\/a> lists ten different &#8220;potential&#8221; security vulnerabilities with a high severity rating, which could be exploited to gain privileged access, bring systems down through a DDoS attack, or access sensitive information. Newer driver releases should fix these high-severity graphics driver vulnerabilities.<\/p>\n<p><picture style=\"padding-bottom: calc(100% * 1316 \/ 2665)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j_500.webp 500w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j_1100.webp 1100w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j.webp 2665w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img fetchpriority=\"high\" decoding=\"async\" alt=\"\" height=\"1316\" width=\"2665\" class=\"b-lazy\" src=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2.jpg\" srcset=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j_500.webp 500w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j_1100.webp 1100w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/05\/2025-05-12-image-2-j.webp 2665w\" sizes=\"(max-width: 960px) 100vw, 680px\"\/><\/picture><\/p>\n<p class=\"tsadinc\">Bugged drivers affect graphics architectures integrated in several Intel processors, ranging from the 6th-gen Intel Core CPU family to the latest Core Ultra chips. The troubled <a href=\"https:\/\/www.techspot.com\/news\/107877-intel-arrow-lake-cpus-throttle-pcie-50-ssd.html\">Arrow Lake microarchitecture<\/a> is affected as well, of course. Furthermore, Intel released new bugfix drivers for its Data Center GPU Flex series (140, 170).<\/p>\n<p class=\"tsadinc\">Last but not least, Intel had to release a couple of firmware updates this month to fix some medium-rated issues in the Core Ultra processors. These particular hardware bugs affect the <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-01180.html\">Integrated Connectivity I\/O interface<\/a> in certain Core Ultra CPUs, which may allow escalation of access privileges if properly exploited.<\/p>\n<p class=\"tsadinc\">Core Ultra processors could also disclose sensitive information because of <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-01322.html\">two distinct vulnerabilities<\/a>, which Intel fixed with new microcode updates for the Core Ultra 5, 7, and 9 CPU series for mobile, desktop, and embedded systems. One of these bugs (CVE-2025-20012) was discovered internally by Intel employees, while the other one (CVE-2025-24495) was reported by security researchers from the VUSec group at VU Amsterdam.<\/p>\n<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Editor&#8217;s take: Intel&#8217;s grand comeback will likely take a bit more time than initially expected. The CPU maker is clearly struggling with both hardware design and software development, and customers are left stranded in a sea of reliability issues, microcode updates, and security flaws as a consequence. Like many other IT vendors and software developers, [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5539,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5538","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5538"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5538\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5539"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}