CVE-2025-31648

EUVD-2025-207126
Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.9 LOW
LOCAL
HIGH
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
intelCNA
3.9 LOW
LOCAL
HIGH
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Debian logo
Debian Releases
Debian Product
Codename
intel-microcode
bookworm
no-dsa
bookworm/non-free-firmware
vulnerable
bookworm/non-free-firmware (security)
vulnerable
bullseye
postponed
bullseye/non-free
vulnerable
bullseye/non-free (security)
vulnerable
forky/non-free-firmware
3.20260210.1
fixed
sid/non-free-firmware
3.20260210.1
fixed
trixie
no-dsa
trixie/non-free-firmware
vulnerable
trixie/non-free-firmware (security)
vulnerable