
Cloud Vulnerability DB
A community-led vulnerabilities database
A processor instruction sequence vulnerability identified as CVE-2025-22840 was discovered affecting certain Intel® Xeon® 6 Scalable processors. The vulnerability was disclosed on August 12, 2025, and allows authenticated users to potentially escalate privileges through local access (NVD Database).
The vulnerability has been assigned CWE-1281 (Sequence of Processor Instructions Leads to Unexpected Behavior). It received a CVSS 3.1 Base Score of 7.4 (High) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L, indicating local access vector, high attack complexity, low privileges required, and user interaction required. Under CVSS 4.0, it received a score of 5.3 (Medium) with the vector string CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N (NVD Database, Ubuntu Security).
The vulnerability impacts confidentiality and integrity at a high level, with low impact on availability. When successfully exploited, it can lead to escalation of privilege on affected systems, potentially compromising system security (Ubuntu Security).
The vulnerability affects multiple Ubuntu releases including 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS, and 14.04 LTS, all of which are currently under evaluation for patches. Users are advised to monitor their system vendors for security updates and apply them as they become available (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."