VYPR

Xeon 6

by Intel

CVEs (6)

  • CVE-2025-20100HigMay 13, 2025
    risk 0.49cvss 7.5epss 0.00

    Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-32086HigAug 12, 2025
    risk 0.47cvss 7.2epss 0.00

    Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-26403HigAug 12, 2025
    risk 0.47cvss 7.2epss 0.00

    Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-24305HigAug 12, 2025
    risk 0.47cvss 7.2epss 0.00

    Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-21090MedAug 12, 2025
    risk 0.42cvss 6.5epss 0.00

    Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2024-48869MedMay 13, 2025
    risk 0.40cvss 6.1epss 0.00

    Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.