Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Posted on August 13, 2025August 13, 2025 By CWS

Dozens of safety advisories have been revealed on Tuesday by Intel, AMD and Nvidia to tell clients about vulnerabilities discovered lately of their merchandise.

Intel has revealed 34 new advisories this Patch Tuesday. Excessive-severity vulnerabilities have been addressed by the corporate in Xeon processors, Ethernet drivers for Linux, chipset firmware, processor stream cache, 800 Sequence Ethernet, PROSet/Wi-fi, and Connectivity Efficiency Suite merchandise. 

Most of them permit privilege escalation, whereas some could be exploited for denial of service (DoS) and knowledge disclosure. 

Intel has addressed medium-severity points in AI Playground, Driver & Help Assistant (DSA), Distribution for Python, PCIe Change, AI for Enterprise Retrieval-augmented Technology, Gadget Plugins for Kubernetes, and TinyCBOR.

Medium-severity flaws have additionally been resolved in RealSense Dynamic Calibrator, Edge Orchestrator for Tiber, Clock Jitter Device, QuickAssist Expertise, UEFI, Graphics, Fast Storage Expertise, oneAPI Toolkit, Hint Analyzer and Collector, E810 Ethernet, and TDX.

Exploitation of the vulnerabilities present in these merchandise can result in privilege escalation, DoS, and knowledge disclosure. 

AMD revealed ten new advisories within the days main as much as and on Patch Tuesday. 

Among the advisories revealed by AMD handle lately revealed analysis papers. One paper comes from ETH Zurich researchers, who confirmed {that a} CPU optimization generally known as the stack engine could be abused for assaults that result in info leakage. In response, AMD suggested builders to comply with current greatest practices to mitigate the potential vulnerability.Commercial. Scroll to proceed studying.

One other paper written by ETH Zurich researchers describes Heracles, a way that allows a malicious hypervisor to execute a side-channel assault in opposition to a working SEV-SNP visitor. An analogous approach was reported to AMD by researchers from the College of Toronto. The corporate has beneficial some mitigations. 

A number of advisories describe a number of vulnerabilities discovered throughout inner and exterior audits in consumer processor platforms, server processors, embedded processors, and graphics and datacenter accelerator merchandise.

The corporate additionally addressed a few bodily assaults, together with a Safe Boot bypass and voltage fault injection on SEV-protected digital machines. AMD famous that bodily assaults fall outdoors the scope of its risk mannequin. 

AMD additionally knowledgeable clients a couple of code execution bug in EDK2 SMM, and an outdated Chromium browser model in Adrenalin driver software program.

Nvidia revealed half a dozen advisories on Patch Tuesday. Within the NeMo framework, which is designed for growing customized generative AI, the corporate mounted two high-severity points that might result in distant code execution and information tampering. 

Two high-severity flaws that may be exploited for code execution, privilege escalation, information tampering, and knowledge disclosure have been resolved within the Megatron-LM framework for AI coaching. 

Within the Merlin open supply library for GPU-accelerated recommender techniques, particularly the Transformers4Rec library, Nvidia patched a safety gap that may result in code execution, info disclosure, privilege escalation, and information tampering.

Vulnerabilities with related potential impression have additionally been mounted by Nvidia within the Isaac GR00T robotic growth platform, and in Apex and WebDataset deep studying software program — one vulnerability has been addressed in every product. 

Associated: Chipmaker Patch Tuesday: Intel, AMD, Arm Reply to New CPU Assaults

Associated: Chipmaker Patch Tuesday: Intel, AMD, Nvidia Repair Excessive-Severity Vulnerabilities

Security Week News Tags:Addressed, AMD, Chipmaker, Intel, Nvidia, Patch, Tuesday, Vulnerabilities

Post navigation

Previous Post: FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
Next Post: Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Related Posts

Urgent Replacement of Discontinued Edge Devices Advised Urgent Replacement of Discontinued Edge Devices Advised Security Week News
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News
Thousands of Secrets Leaked on Code Formatting Platforms Thousands of Secrets Leaked on Code Formatting Platforms Security Week News
RTX Confirms Airport Services Hit by Ransomware RTX Confirms Airport Services Hit by Ransomware Security Week News
Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark