Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4347-1 | intel-microcode security update |
Debian DSA |
DSA-6030-1 | intel-microcode security update |
EUVD |
EUVD-2025-24382 | Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
Ubuntu USN |
USN-7866-1 | Intel Microcode vulnerabilities |
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intel
Intel processors Intel xeon Intel xeon Processors |
|
| Vendors & Products |
Intel
Intel processors Intel xeon Intel xeon Processors |
Wed, 13 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. | |
| Weaknesses | CWE-358 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2026-02-26T17:49:25.134Z
Reserved: 2025-04-04T03:00:34.367Z
Link: CVE-2025-32086
Updated: 2025-11-03T17:32:29.530Z
Status : Deferred
Published: 2025-08-12T17:15:38.690
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-32086
No data.
OpenCVE Enrichment
Updated: 2025-08-13T21:48:01Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN