Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
Typedeb
Namespacedebian
Nameintel-microcode
Version3.20251111.1~deb12u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.20260227.1
Latest_non_vulnerable_version3.20260227.1
Affected_by_vulnerabilities
0
url VCID-38q7-4ar3-sqcc
vulnerability_id VCID-38q7-4ar3-sqcc
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31648.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31648
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00265
published_at 2026-04-29T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00237
published_at 2026-04-11T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00235
published_at 2026-04-16T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00234
published_at 2026-04-13T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00236
published_at 2026-04-18T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.0027
published_at 2026-04-24T12:55:00Z
6
value 5e-05
scoring_system epss
scoring_elements 0.00268
published_at 2026-04-26T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00322
published_at 2026-04-09T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00334
published_at 2026-04-02T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00332
published_at 2026-04-04T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00324
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127837
reference_id 1127837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127837
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2438510
reference_id 2438510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2438510
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html
reference_id intel-sa-01396.html
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-11T04:56:25Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html
7
reference_url https://usn.ubuntu.com/8068-1/
reference_id USN-8068-1
reference_type
scores
url https://usn.ubuntu.com/8068-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20260227.1
purl pkg:deb/debian/intel-microcode@3.20260227.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1
aliases CVE-2025-31648
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38q7-4ar3-sqcc
Fixing_vulnerabilities
0
url VCID-2ues-wvyq-6qc9
vulnerability_id VCID-2ues-wvyq-6qc9
summary Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02656
published_at 2026-04-26T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02666
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02678
published_at 2026-04-21T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.0515
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-32086
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ues-wvyq-6qc9
1
url VCID-3y3x-qqep-43ec
vulnerability_id VCID-3y3x-qqep-43ec
summary microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01612
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01591
published_at 2026-04-21T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.016
published_at 2026-04-24T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01597
published_at 2026-04-26T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01509
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01513
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01516
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01508
published_at 2026-04-11T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.015
published_at 2026-04-12T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01501
published_at 2026-04-13T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01487
published_at 2026-04-16T12:55:00Z
13
value 0.00012
scoring_system epss
scoring_elements 0.01503
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
reference_id 2345421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:13:26Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-31157
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3y3x-qqep-43ec
2
url VCID-4uuw-pm94-1kak
vulnerability_id VCID-4uuw-pm94-1kak
summary Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.09017
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09068
published_at 2026-04-04T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08992
published_at 2026-04-07T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.09103
published_at 2026-04-09T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09104
published_at 2026-04-11T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.09058
published_at 2026-04-13T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08952
published_at 2026-04-16T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.093
published_at 2026-04-21T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09304
published_at 2026-04-26T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-29T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09145
published_at 2026-04-18T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09349
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T19:09:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-21090
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uuw-pm94-1kak
3
url VCID-51nr-8avm-qued
vulnerability_id VCID-51nr-8avm-qued
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21497
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21164
published_at 2026-04-29T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21369
published_at 2026-04-18T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21337
published_at 2026-04-21T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-24T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21187
published_at 2026-04-26T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21553
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21387
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21448
published_at 2026-04-09T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21459
published_at 2026-04-11T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-12T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21365
published_at 2026-04-13T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21361
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
reference_id 2366114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T20:19:54Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20012
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51nr-8avm-qued
4
url VCID-5cgx-1n9u-gqbh
vulnerability_id VCID-5cgx-1n9u-gqbh
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.27978
published_at 2026-04-29T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-18T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28263
published_at 2026-04-21T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28167
published_at 2026-04-24T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28055
published_at 2026-04-26T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28516
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28307
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28372
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28416
published_at 2026-04-09T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28419
published_at 2026-04-11T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28376
published_at 2026-04-12T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-13T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
reference_id 2366162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:56:46Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-45332
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cgx-1n9u-gqbh
5
url VCID-5vkn-4rqc-qkbk
vulnerability_id VCID-5vkn-4rqc-qkbk
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22271
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21939
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22149
published_at 2026-04-18T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-21T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.21965
published_at 2026-04-24T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.21952
published_at 2026-04-26T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22314
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22182
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22236
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
reference_id 2366089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T17:16:37Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-24495
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-4rqc-qkbk
6
url VCID-6ake-v15c-k7aq
vulnerability_id VCID-6ake-v15c-k7aq
summary Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21820
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02789
published_at 2026-04-29T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-18T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02747
published_at 2026-04-24T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02734
published_at 2026-04-26T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02669
published_at 2026-04-04T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-07T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02679
published_at 2026-04-08T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-09T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-11T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02658
published_at 2026-04-12T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02656
published_at 2026-04-13T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02638
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21820
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
reference_id intel-sa-01079.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:33Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
5
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-21820
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ake-v15c-k7aq
7
url VCID-6thk-vf9t-gygs
vulnerability_id VCID-6thk-vf9t-gygs
summary microcode_ctl: Insufficient granularity of access control in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-29T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06624
published_at 2026-04-21T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06636
published_at 2026-04-24T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0665
published_at 2026-04-26T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06438
published_at 2026-04-02T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06474
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06462
published_at 2026-04-07T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06512
published_at 2026-04-08T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06553
published_at 2026-04-09T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06548
published_at 2026-04-11T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06541
published_at 2026-04-12T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06532
published_at 2026-04-13T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06467
published_at 2026-04-16T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
reference_id 2345381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:14:06Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-39279
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6thk-vf9t-gygs
8
url VCID-75cx-avm7-tfcb
vulnerability_id VCID-75cx-avm7-tfcb
summary Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03407
published_at 2026-04-16T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03482
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.0353
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03485
published_at 2026-04-11T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03457
published_at 2026-04-12T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03432
published_at 2026-04-13T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03493
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03505
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04272
published_at 2026-04-26T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04253
published_at 2026-04-24T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04242
published_at 2026-04-21T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04119
published_at 2026-04-18T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.06374
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
reference_id intel-sa-01311.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22889
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75cx-avm7-tfcb
9
url VCID-7wcy-5hnc-tfh4
vulnerability_id VCID-7wcy-5hnc-tfh4
summary Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03426
published_at 2026-04-18T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03362
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.0356
published_at 2026-04-26T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03554
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03546
published_at 2026-04-21T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03375
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03391
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-09T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-12T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03324
published_at 2026-04-13T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.033
published_at 2026-04-16T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05328
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
reference_id intel-sa-01249.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:16:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20109
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wcy-5hnc-tfh4
10
url VCID-8nyc-r2e4-17gr
vulnerability_id VCID-8nyc-r2e4-17gr
summary Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01261
published_at 2026-04-29T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-11T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00601
published_at 2026-04-07T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00599
published_at 2026-04-08T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00606
published_at 2026-04-02T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00589
published_at 2026-04-12T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.0059
published_at 2026-04-13T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00585
published_at 2026-04-16T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-04T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-21T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00738
published_at 2026-04-26T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.00694
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:22Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-24305
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyc-r2e4-17gr
11
url VCID-b55f-n1ed-g7eq
vulnerability_id VCID-b55f-n1ed-g7eq
summary microcode_ctl: Uncaught exception in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11706
published_at 2026-04-29T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11737
published_at 2026-04-16T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11736
published_at 2026-04-18T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11852
published_at 2026-04-21T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11821
published_at 2026-04-24T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11776
published_at 2026-04-26T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14522
published_at 2026-04-07T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14669
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14628
published_at 2026-04-11T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14591
published_at 2026-04-12T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-13T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14638
published_at 2026-04-02T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.1471
published_at 2026-04-04T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14611
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
reference_id 2366113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:48:16Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20054
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b55f-n1ed-g7eq
12
url VCID-eh71-uhnv-fqeb
vulnerability_id VCID-eh71-uhnv-fqeb
summary Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.0856
published_at 2026-04-29T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08455
published_at 2026-04-16T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-18T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08597
published_at 2026-04-21T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.0861
published_at 2026-04-24T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08539
published_at 2026-04-02T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0851
published_at 2026-04-07T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08583
published_at 2026-04-08T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08604
published_at 2026-04-09T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-11T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.0858
published_at 2026-04-12T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08563
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
reference_id intel-sa-01228.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:12:11Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-39355
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh71-uhnv-fqeb
13
url VCID-ejhc-6yqt-gkgv
vulnerability_id VCID-ejhc-6yqt-gkgv
summary x86: Indirect Target Selection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-09T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25806
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25577
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.2565
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-11T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45428
published_at 2026-04-26T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.4551
published_at 2026-04-13T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45557
published_at 2026-04-16T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45554
published_at 2026-04-18T12:55:00Z
11
value 0.00227
scoring_system epss
scoring_elements 0.45419
published_at 2026-04-24T12:55:00Z
12
value 0.00227
scoring_system epss
scoring_elements 0.45368
published_at 2026-04-29T12:55:00Z
13
value 0.00227
scoring_system epss
scoring_elements 0.45505
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
reference_id 1105193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
reference_id 2366125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
7
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
reference_id intel-sa-01153.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
9
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
10
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
11
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
12
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
13
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
14
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
15
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
16
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
17
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
18
reference_url https://access.redhat.com/errata/RHSA-2025:13962
reference_id RHSA-2025:13962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13962
19
reference_url https://access.redhat.com/errata/RHSA-2025:19962
reference_id RHSA-2025:19962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19962
20
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
21
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
22
reference_url https://xenbits.xen.org/xsa/advisory-469.html
reference_id XSA-469
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-469.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28956, XSA-469
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv
14
url VCID-ejsj-eyej-huc6
vulnerability_id VCID-ejsj-eyej-huc6
summary Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23918
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18896
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21165
published_at 2026-04-29T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.2137
published_at 2026-04-18T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21337
published_at 2026-04-21T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.2119
published_at 2026-04-24T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21188
published_at 2026-04-26T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21554
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.2131
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21388
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-09T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.2146
published_at 2026-04-11T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-12T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21366
published_at 2026-04-13T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21362
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23918
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
reference_id intel-sa-01079.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:34Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
5
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-23918
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejsj-eyej-huc6
15
url VCID-f859-13vd-7uef
vulnerability_id VCID-f859-13vd-7uef
summary Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02656
published_at 2026-04-26T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02666
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02678
published_at 2026-04-21T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.0515
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-26403
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f859-13vd-7uef
16
url VCID-gmr7-umz8-9fhm
vulnerability_id VCID-gmr7-umz8-9fhm
summary Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05742
published_at 2026-04-11T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05666
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05686
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0573
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05735
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05706
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05699
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06436
published_at 2026-04-29T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06168
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.0632
published_at 2026-04-21T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-24T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.06364
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
reference_id intel-sa-01310.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:09:05Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22839
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr7-umz8-9fhm
17
url VCID-j4ak-hjn5-guat
vulnerability_id VCID-j4ak-hjn5-guat
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26489
published_at 2026-04-29T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26626
published_at 2026-04-21T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26569
published_at 2026-04-24T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26561
published_at 2026-04-26T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
reference_id 2366133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:10:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ak-hjn5-guat
18
url VCID-j6j9-vj4t-bfa6
vulnerability_id VCID-j6j9-vj4t-bfa6
summary Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02656
published_at 2026-04-26T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02666
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02678
published_at 2026-04-21T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.0515
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T18:24:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20053
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6j9-vj4t-bfa6
19
url VCID-kha2-8ez1-gfhr
vulnerability_id VCID-kha2-8ez1-gfhr
summary Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01417
published_at 2026-04-29T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0078
published_at 2026-04-08T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00769
published_at 2026-04-11T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00781
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00775
published_at 2026-04-09T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00762
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00763
published_at 2026-04-16T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00933
published_at 2026-04-21T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00941
published_at 2026-04-26T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00937
published_at 2026-04-24T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00883
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
reference_id intel-sa-01308.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-14T03:55:09Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22840
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kha2-8ez1-gfhr
20
url VCID-mekt-8gm1-33ej
vulnerability_id VCID-mekt-8gm1-33ej
summary Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23984
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11011
published_at 2026-04-29T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11054
published_at 2026-04-18T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11185
published_at 2026-04-21T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.1112
published_at 2026-04-24T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11075
published_at 2026-04-26T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11217
published_at 2026-04-02T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11279
published_at 2026-04-04T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11093
published_at 2026-04-07T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11172
published_at 2026-04-08T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11228
published_at 2026-04-09T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11238
published_at 2026-04-11T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11206
published_at 2026-04-12T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.1118
published_at 2026-04-13T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23984
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
reference_id 1081363
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
reference_id intel-sa-01103.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:27:46Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
5
reference_url https://usn.ubuntu.com/7033-1/
reference_id USN-7033-1
reference_type
scores
url https://usn.ubuntu.com/7033-1/
6
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-23984
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mekt-8gm1-33ej
21
url VCID-npgb-p786-d3fe
vulnerability_id VCID-npgb-p786-d3fe
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06068
published_at 2026-04-29T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-24T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-26T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
reference_id 2345416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:25Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2023-43758
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npgb-p786-d3fe
22
url VCID-qtg5-1dxw-sfdc
vulnerability_id VCID-qtg5-1dxw-sfdc
summary microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06068
published_at 2026-04-29T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-24T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-26T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
reference_id 2345365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:17:24Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-29214
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg5-1dxw-sfdc
23
url VCID-qzcy-2xsr-vqeh
vulnerability_id VCID-qzcy-2xsr-vqeh
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06068
published_at 2026-04-29T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-24T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-26T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
reference_id 2345370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:16:50Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28127
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzcy-2xsr-vqeh
24
url VCID-r46f-12hj-7ybb
vulnerability_id VCID-r46f-12hj-7ybb
summary microcode_ctl: Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24968
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12761
published_at 2026-04-29T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12781
published_at 2026-04-18T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12879
published_at 2026-04-21T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12901
published_at 2026-04-24T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12866
published_at 2026-04-26T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-02T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.13067
published_at 2026-04-04T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12867
published_at 2026-04-07T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12945
published_at 2026-04-08T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12996
published_at 2026-04-09T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12957
published_at 2026-04-11T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12921
published_at 2026-04-12T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12877
published_at 2026-04-13T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12778
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
reference_id 1081363
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312594
reference_id 2312594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312594
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
reference_id intel-sa-01097.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:28:45Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
7
reference_url https://access.redhat.com/errata/RHSA-2024:10528
reference_id RHSA-2024:10528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10528
8
reference_url https://usn.ubuntu.com/7033-1/
reference_id USN-7033-1
reference_type
scores
url https://usn.ubuntu.com/7033-1/
9
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-24968
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r46f-12hj-7ybb
25
url VCID-t7rc-zadf-cybq
vulnerability_id VCID-t7rc-zadf-cybq
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01612
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01591
published_at 2026-04-21T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.016
published_at 2026-04-24T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01597
published_at 2026-04-26T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01624
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01625
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01632
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-11T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-12T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01607
published_at 2026-04-13T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01596
published_at 2026-04-16T12:55:00Z
13
value 0.00012
scoring_system epss
scoring_elements 0.0161
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
reference_id 2345363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:04:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28047
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7rc-zadf-cybq
26
url VCID-t85u-116v-7uan
vulnerability_id VCID-t85u-116v-7uan
summary microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03535
published_at 2026-04-29T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.0338
published_at 2026-04-18T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03496
published_at 2026-04-21T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03483
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03435
published_at 2026-04-02T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03449
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03462
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03465
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03488
published_at 2026-04-26T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03445
published_at 2026-04-11T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-12T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03392
published_at 2026-04-13T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03369
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
reference_id 2345376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T19:49:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-24582
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t85u-116v-7uan
27
url VCID-vsda-kq13-73g1
vulnerability_id VCID-vsda-kq13-73g1
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06068
published_at 2026-04-29T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-24T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-26T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
reference_id 2345401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:01Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2023-34440
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsda-kq13-73g1
28
url VCID-w7k1-y36j-3ye6
vulnerability_id VCID-w7k1-y36j-3ye6
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21853
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09188
published_at 2026-04-29T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09067
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09223
published_at 2026-04-21T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-24T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09213
published_at 2026-04-26T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09149
published_at 2026-04-02T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09202
published_at 2026-04-04T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09126
published_at 2026-04-07T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-12T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-09T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-11T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09192
published_at 2026-04-13T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09087
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326074
reference_id 2326074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326074
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
reference_id intel-sa-01101.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-13T21:13:32Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
7
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-21853
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7k1-y36j-3ye6
29
url VCID-wgce-vves-guek
vulnerability_id VCID-wgce-vves-guek
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04028
published_at 2026-04-29T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03843
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03962
published_at 2026-04-21T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03978
published_at 2026-04-24T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03982
published_at 2026-04-26T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03877
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03886
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.039
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03905
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-09T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03899
published_at 2026-04-11T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.0388
published_at 2026-04-12T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.03854
published_at 2026-04-13T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
reference_id 2345359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
reference_id intel-sa-01166.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:07:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-31068
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgce-vves-guek
30
url VCID-wqfe-hkrk-nbaj
vulnerability_id VCID-wqfe-hkrk-nbaj
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26489
published_at 2026-04-29T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26626
published_at 2026-04-21T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26569
published_at 2026-04-24T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26561
published_at 2026-04-26T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
reference_id 2366159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:59:10Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-43420
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqfe-hkrk-nbaj
31
url VCID-wv5f-6x7x-7fdw
vulnerability_id VCID-wv5f-6x7x-7fdw
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07415
published_at 2026-04-29T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07365
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07493
published_at 2026-04-21T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07453
published_at 2026-04-24T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07444
published_at 2026-04-26T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07382
published_at 2026-04-02T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07409
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07467
published_at 2026-04-12T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-13T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07379
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
reference_id 2345367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
reference_id intel-sa-01213.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:27:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-36293
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv5f-6x7x-7fdw
32
url VCID-wyf3-shyh-qyhc
vulnerability_id VCID-wyf3-shyh-qyhc
summary Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01378
published_at 2026-04-29T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-18T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01365
published_at 2026-04-21T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01374
published_at 2026-04-24T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.0138
published_at 2026-04-26T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-02T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-04T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01296
published_at 2026-04-07T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-08T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01305
published_at 2026-04-09T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01289
published_at 2026-04-11T12:55:00Z
11
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-12T12:55:00Z
12
value 0.00011
scoring_system epss
scoring_elements 0.01286
published_at 2026-04-13T12:55:00Z
13
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
reference_id intel-sa-01194.html
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
1
value 4.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:57:53Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-37020
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyf3-shyh-qyhc
33
url VCID-zcxx-ra5c-hyh9
vulnerability_id VCID-zcxx-ra5c-hyh9
summary microcode_ctl: Insufficient resource pool in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2562
published_at 2026-04-29T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25777
published_at 2026-04-16T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.2576
published_at 2026-04-18T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25731
published_at 2026-04-21T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-24T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25668
published_at 2026-04-26T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29348
published_at 2026-04-07T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-09T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29457
published_at 2026-04-11T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29413
published_at 2026-04-12T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.2936
published_at 2026-04-13T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.29479
published_at 2026-04-02T12:55:00Z
12
value 0.0011
scoring_system epss
scoring_elements 0.29527
published_at 2026-04-04T12:55:00Z
13
value 0.0011
scoring_system epss
scoring_elements 0.29412
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
reference_id 2366091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:49:36Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxx-ra5c-hyh9
Risk_score1.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1