CVE-2025-22840

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
intelCNA
7.4 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
Debian logo
Debian Releases
Debian Product
Codename
intel-microcode
bullseye/non-free
vulnerable
bullseye/non-free (security)
3.20250812.1~deb11u1
fixed
bookworm/non-free-firmware
vulnerable
bookworm/non-free-firmware (security)
3.20250812.1~deb12u1
fixed
trixie/non-free-firmware (security)
3.20250812.1~deb13u1
fixed
trixie/non-free-firmware
3.20250812.1~deb13u1
fixed
sid/non-free-firmware
3.20251111.1
fixed
forky/non-free-firmware
3.20251111.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
intel-microcode
questing
Fixed 3.20250812.0ubuntu0.25.10.1
released
plucky
Fixed 3.20250812.0ubuntu0.25.04.1
released
noble
Fixed 3.20250812.0ubuntu0.24.04.1
released
jammy
Fixed 3.20250812.0ubuntu0.22.04.1
released
focal
Fixed 3.20250812.0ubuntu0.20.04.1+esm1
released
bionic
Fixed 3.20250812.0ubuntu0.18.04.1+esm1
released
xenial
Fixed 3.20250812.0ubuntu0.16.04.1+esm1
released
trusty
ignored