CVE-2025-20054
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-20054 is a security vulnerability affecting Intel® Processors' core management mechanism. The vulnerability was discovered and reported by Intel Corporation, with initial CVE record creation on October 11, 2024, and publication to the NVD on May 13, 2025. The vulnerability involves an uncaught exception in the core management mechanism that could potentially lead to denial of service conditions (NVD, Wiz).

Technical details

The vulnerability is classified as CWE-248 (Uncaught Exception) and has received a CVSS v4.0 base score of 6.8 (MEDIUM) with the vector string CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N. Under CVSS v3.1, it received a base score of 6.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H (NVD).

Impact

The vulnerability can result in denial of service conditions when successfully exploited. The impact is primarily focused on system availability, with no direct impact on confidentiality or integrity. The vulnerability requires local access and authenticated user privileges to exploit (NVD, Wiz).

Mitigation and workarounds

Intel has released microcode updates to address this vulnerability. For affected systems, updated versions of the intel-microcode package have been made available through various Linux distributions including Debian, Ubuntu, and Red Hat (Wiz, Rapid7).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management