Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Posted on August 13, 2025August 13, 2025 By CWS

Dozens of safety advisories have been revealed on Tuesday by Intel, AMD and Nvidia to tell clients about vulnerabilities discovered lately of their merchandise.

Intel has revealed 34 new advisories this Patch Tuesday. Excessive-severity vulnerabilities have been addressed by the corporate in Xeon processors, Ethernet drivers for Linux, chipset firmware, processor stream cache, 800 Sequence Ethernet, PROSet/Wi-fi, and Connectivity Efficiency Suite merchandise. 

Most of them permit privilege escalation, whereas some could be exploited for denial of service (DoS) and knowledge disclosure. 

Intel has addressed medium-severity points in AI Playground, Driver & Help Assistant (DSA), Distribution for Python, PCIe Change, AI for Enterprise Retrieval-augmented Technology, Gadget Plugins for Kubernetes, and TinyCBOR.

Medium-severity flaws have additionally been resolved in RealSense Dynamic Calibrator, Edge Orchestrator for Tiber, Clock Jitter Device, QuickAssist Expertise, UEFI, Graphics, Fast Storage Expertise, oneAPI Toolkit, Hint Analyzer and Collector, E810 Ethernet, and TDX.

Exploitation of the vulnerabilities present in these merchandise can result in privilege escalation, DoS, and knowledge disclosure. 

AMD revealed ten new advisories within the days main as much as and on Patch Tuesday. 

Among the advisories revealed by AMD handle lately revealed analysis papers. One paper comes from ETH Zurich researchers, who confirmed {that a} CPU optimization generally known as the stack engine could be abused for assaults that result in info leakage. In response, AMD suggested builders to comply with current greatest practices to mitigate the potential vulnerability.Commercial. Scroll to proceed studying.

One other paper written by ETH Zurich researchers describes Heracles, a way that allows a malicious hypervisor to execute a side-channel assault in opposition to a working SEV-SNP visitor. An analogous approach was reported to AMD by researchers from the College of Toronto. The corporate has beneficial some mitigations. 

A number of advisories describe a number of vulnerabilities discovered throughout inner and exterior audits in consumer processor platforms, server processors, embedded processors, and graphics and datacenter accelerator merchandise.

The corporate additionally addressed a few bodily assaults, together with a Safe Boot bypass and voltage fault injection on SEV-protected digital machines. AMD famous that bodily assaults fall outdoors the scope of its risk mannequin. 

AMD additionally knowledgeable clients a couple of code execution bug in EDK2 SMM, and an outdated Chromium browser model in Adrenalin driver software program.

Nvidia revealed half a dozen advisories on Patch Tuesday. Within the NeMo framework, which is designed for growing customized generative AI, the corporate mounted two high-severity points that might result in distant code execution and information tampering. 

Two high-severity flaws that may be exploited for code execution, privilege escalation, information tampering, and knowledge disclosure have been resolved within the Megatron-LM framework for AI coaching. 

Within the Merlin open supply library for GPU-accelerated recommender techniques, particularly the Transformers4Rec library, Nvidia patched a safety gap that may result in code execution, info disclosure, privilege escalation, and information tampering.

Vulnerabilities with related potential impression have additionally been mounted by Nvidia within the Isaac GR00T robotic growth platform, and in Apex and WebDataset deep studying software program — one vulnerability has been addressed in every product. 

Associated: Chipmaker Patch Tuesday: Intel, AMD, Arm Reply to New CPU Assaults

Associated: Chipmaker Patch Tuesday: Intel, AMD, Nvidia Repair Excessive-Severity Vulnerabilities

Security Week News Tags:Addressed, AMD, Chipmaker, Intel, Nvidia, Patch, Tuesday, Vulnerabilities

Post navigation

Previous Post: FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
Next Post: Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Related Posts

Adidas Data Breach Linked to Third-Party Vendor Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
Cellcom Service Disruption Caused by Cyberattack Security Week News
Air France, KLM Say Hackers Accessed Customer Data Security Week News
Printer Company Procolored Served Infected Software for Months Security Week News
Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News