Xeon Intel Xeon

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Intel Xeon.

By the Year

In 2026 there have been 0 vulnerabilities in Intel Xeon. Last year, in 2025 Xeon had 3 security vulnerabilities published. Right now, Xeon is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 3 6.90
2024 3 0.00
2023 1 4.40
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 8 5.93

It may take a day or so for new Xeon vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Intel Xeon Security Vulnerabilities

Intel Xeon 6 PRIVEsc via DDRIO config with SGX/TDX (CVE-2025-32086)
CVE-2025-32086 7.2 - High - August 12, 2025

Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

Improperly Implemented Security Check for Standard

Intel Xeon Privilege Escalation via Instruction Sequencing (CVE-2025-22840)
CVE-2025-22840 7.4 - High - August 12, 2025

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access

Halt and Catch Fire

Intel Xeon 6 Processor Privileged Escalation via TDX/SGX Interface Restriction
CVE-2024-48869 6.1 - Medium - May 13, 2025

Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.

Hardware Features Enable Physical Attacks from Software

Intel(R) Xeon(R) Processor Family (E-Core) SPP Protection Mechanism Failure Privilege Escalation Vul
CVE-2024-38660 - November 13, 2024

Protection mechanism failure in the SPP for some Intel(R) Xeon(R) processor family (E-Core) may allow an authenticated user to potentially enable escalation of privilege via local access.

Protection Mechanism Failure

Intel(R) Xeon(R) Processors UEFI Firmware Control Flow Management Vulnerability
CVE-2024-25565 - November 13, 2024

Insufficient control flow management in UEFI firmware for some Intel(R) Xeon(R) Processors may allow an authenticated user to enable denial of service via local access.

Insufficient Control Flow Management

Xeon Privilege Escalation via Protection Mechanism Failure
CVE-2024-24980 - August 14, 2024

Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Intel Xeon 3rd Gen Improper Access Control -> Info Disclosure
CVE-2023-23908 4.4 - Medium - August 11, 2023

Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.

Systems with microprocessors utilizing speculative execution and address translations may
CVE-2018-3620 5.6 - Medium - August 14, 2018

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

Side Channel Attack

Systems with microprocessors utilizing speculative execution and address translations may
CVE-2018-3646 5.6 - Medium - August 14, 2018

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family
CVE-2018-3652 7.6 - High - July 10, 2018

Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.

Information Disclosure

Systems with microprocessors utilizing speculative execution and branch prediction may
CVE-2018-3693 5.6 - Medium - July 10, 2018

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

Systems with microprocessors utilizing speculative execution may
CVE-2018-9056 5.6 - Medium - March 27, 2018

Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.

Information Disclosure

Systems with microprocessors utilizing speculative execution and branch prediction may
CVE-2017-5753 - January 04, 2018

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Systems with microprocessors utilizing speculative execution and indirect branch prediction may
CVE-2017-5715 5.6 - Medium - January 04, 2018

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Side Channel Attack

Systems with microprocessors utilizing speculative execution and indirect branch prediction may
CVE-2017-5754 - January 04, 2018

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Intel Xeon or by Intel? Click the Watch button to subscribe.

Intel
Vendor

Intel Xeon
Product

subscribe