| CVE-2025-31648 | Intel Processors 安全漏洞 | - | Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. | 低危 | 3.9 | 2026-02-10 16:25:36 | 深度分析 |
| CVE-2025-32001 | Intel Processor Identification Utility 代码问题漏洞 | - | Intel(R) Processor Identification Utility | 中危 | 6.7 | 2025-11-11 16:50:55 | 深度分析 |
| CVE-2025-27246 | Intel Processor Identification Utility 安全漏洞 | - | Intel(R) Processor Identification Utility | 中危 | 6.7 | 2025-11-11 16:50:19 | 深度分析 |
| CVE-2025-20010 | Intel Processor Identification Utility 安全漏洞 | - | Intel(R) Processor Identification Utility | 高危 | 7.8 | 2025-11-11 16:49:23 | 深度分析 |
| CVE-2025-22889 | Intel Xeon 6 Processor 安全漏洞 | - | Intel(R) Xeon(R) 6 processor with Intel(R) TDX | 高危 | 7.9 | 2025-08-12 16:58:41 | 深度分析 |
| CVE-2025-20053 | Intel Xeon Processor 缓冲区错误漏洞 | - | Intel(R) Xeon(R) Processor firmware with SGX enabled | 高危 | 7.2 | 2025-08-12 16:58:03 | 深度分析 |
| CVE-2024-48869 | Intel Xeon 6 Processor 安全漏洞 | - | Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) | 中危 | 6.1 | 2025-05-13 21:03:23 | 深度分析 |
| CVE-2025-20100 | Intel Xeon 6 Processor 访问控制错误漏洞 | - | Intel(R) Xeon(R) 6 processor with E-cores | 高危 | 7.5 | 2025-05-13 21:02:12 | 深度分析 |
| CVE-2025-20004 | Intel Xeon 6 Processor 安全漏洞 | - | Intel(R) Xeon(R) 6 processor E-Cores firmware | 高危 | 7.2 | 2025-05-13 21:01:28 | 深度分析 |
| CVE-2025-21194 | Microsoft Surface 输入验证错误漏洞 | Microsoft | Microsoft Surface Go | 高危 | 7.1 | 2025-02-11 17:58:26 | 深度分析 |
| CVE-2024-38660 | Intel Processors 安全漏洞 | - | Intel(R) Xeon(R) processor family (E-Core) | 低危 | 3.8 | 2024-11-13 21:11:54 | 深度分析 |
| CVE-2024-21820 | Intel SGX SDK 安全漏洞 | - | Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX | 高危 | 7.2 | 2024-11-13 20:34:18 | 深度分析 |
| CVE-2024-23918 | Intel SGX driver 安全漏洞 | - | Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX | 高危 | 8.8 | 2024-11-13 20:34:16 | 深度分析 |
| CVE-2023-42667 | Intel Core Ultra Processors 安全漏洞 | - | Intel(R) Core(TM) Ultra Processor stream cache mechanism | 高危 | 7.8 | 2024-08-14 13:45:38 | 深度分析 |
| CVE-2024-24853 | Intel Processors 安全漏洞 | - | Intel(R) Processor | 高危 | 7.2 | 2024-08-14 13:45:32 | 深度分析 |
| CVE-2024-21774 | Intel Processor Identification Utility 安全漏洞 | - | Intel(R) Processor Identification Utility software | 中危 | 6.7 | 2024-05-16 20:47:07 | 深度分析 |
| CVE-2024-21831 | Intel Processor Diagnostic Tool 安全漏洞 | - | Intel(R) Processor Diagnostic Tool software | 中危 | 6.7 | 2024-05-16 20:47:02 | 深度分析 |
| CVE-2020-8702 | Intel Processor Diagnostic Tool代码问题漏洞 | - | Intel(R) Processor Diagnostic Tool | 高危 | - | 2021-06-09 18:47:29 | 深度分析 |
| CVE-2020-12335 | Intel Processor Identification Utility 安全漏洞 | - | Intel(R) Processor Identification Utility | 高危 | - | 2020-11-12 18:17:39 | 深度分析 |
| CVE-2018-12207 | Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞 | - | 2019.2 IPU – Intel(R) Processor Machine Check Error | 中危 | - | 2019-11-14 19:08:45 | 深度分析 |