Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4347-1 | intel-microcode security update |
Debian DSA |
DSA-6030-1 | intel-microcode security update |
EUVD |
EUVD-2025-24411 | Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Ubuntu USN |
USN-7866-1 | Intel Microcode vulnerabilities |
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intel
Intel processors Intel xeon Intel xeon Processors |
|
| Vendors & Products |
Intel
Intel processors Intel xeon Intel xeon Processors |
|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. | |
| Weaknesses | CWE-691 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2026-02-26T17:49:30.565Z
Reserved: 2025-01-23T03:59:09.904Z
Link: CVE-2025-24305
Updated: 2025-11-03T17:32:20.023Z
Status : Deferred
Published: 2025-08-12T17:15:33.257
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-24305
No data.
OpenCVE Enrichment
Updated: 2025-08-13T21:48:03Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN