CVE-2025-32086Improperly Implemented Security Check for Standard in Intel-microcode

Severity
4.5MEDIUMNVD
OSV7.0
EPSS
0.0%
top 97.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 12
Latest updateNov 10

Description

Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N

Affected Packages1 packages

debiandebian/intel-microcode< intel-microcode 3.20250812.1~deb12u1 (bookworm)

🔴Vulnerability Details

3
OSV
intel-microcode vulnerabilities2025-11-10
GHSA
GHSA-4472-mrv9-mf4h: Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(2025-08-12
OSV
CVE-2025-32086: Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(2025-08-12

📋Vendor Advisories

2
Ubuntu
Intel Microcode vulnerabilities2025-11-10
Debian
CVE-2025-32086: intel-microcode - Improperly implemented security check for standard in the DDRIO configuration fo...2025