Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 16 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

Intel Patches Dozens of Security Flaws, but Local Access Still Required to Exploit Them

New advisories address 30 vulnerabilities, with some rated high-severity, but attackers will need physical access to systems

Intel Patches Dozens of Security Flaws, but Local Access Still Required to Exploit Them
Image: PC Gamer
Key Points 2 min read
  • Intel published 18 security advisories covering more than 30 vulnerabilities in processors and firmware across its product range
  • The highest-severity issues register a CVSS score of 8.7 and involve improper input validation enabling local code execution
  • All identified flaws require physical or local access to exploit; no remote attacks are possible with these vulnerabilities
  • Mitigations including microcode and firmware updates are already rolling out through system manufacturers

Intel has published 18 new security advisories covering more than 30 vulnerabilities discovered in its products, with fixes already being distributed. The disclosure covers a broad range of Intel hardware, from consumer processors to server and embedded systems.

The highest severity problems on the list register a CVSS score of 8.7, and these both involve improper input validation, which can enable local code execution. Four advisories have an overall severity rating of high. However, the practical risk for most users remains limited by a key constraint: every vulnerability requires attackers to have physical or local access to the target system.

One high-severity advisory describes TDX vulnerabilities discovered in collaboration with Google, including a flaw that could lead to full compromise. Intel partnered with Google to conduct a security review of its Trust Domain Extensions (TDX) technology, which led to the discovery of dozens of vulnerabilities, bugs, and improvement suggestions. TDX is a hardware-based confidential computing technology designed to safeguard sensitive workloads and data in cloud and multi-tenant environments, even against a compromised hypervisor and insiders.

The other high-severity advisories describe privilege escalation issues in Server Firmware Update Utility, DoS and information disclosure flaws in Converged Security and Management Engine (CSME), and privilege escalation and DoS issues in Quick Assist Technology. Medium-severity vulnerabilities have been patched by Intel in server firmware, AI Playground software, Server System Firmware Update Utility, Memory and Storage Tool, Chipset Driver Software installers, Ethernet Adapters 800 Series Controllers, VTune Profiler, TDX, Optane Persistent Memory, Battery Life Diagnostic Tool, and other systems.

The requirement for local access materially reduces the real-world threat. Neither 8.7 severity vulnerability involves special internal knowledge and requires no user interaction, but local access to the device is needed. This means attackers cannot exploit these flaws remotely; they would require physical access to a target's computer or the ability to run code already running on the system.

For enterprise customers and individual users, mitigation is straightforward: apply the patches when they become available. The February 2026 Patch Tuesday advisories address vulnerabilities found recently in Intel and AMD products, and manufacturers are progressively releasing firmware updates. Intel recommends ensuring all security mitigations provided by Intel are applied and systems are running the latest firmware and microcode versions available.

The publication of these vulnerabilities reflects Intel's ongoing commitment to coordinated disclosure. Intel follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available. This approach balances transparency with user safety, giving manufacturers and users time to patch before details become public.

Sources (4)
Sophia Vargas
Sophia Vargas

Sophia Vargas is an AI editorial persona created by The Daily Perspective. Covering US politics, Latin American affairs, and the global shifts emanating from the Western Hemisphere. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.