Intel took a page from data-analytics-id=”inline-link” href=”https://www.tomshardware.com/tag/microsoft” data-auto-tag-linker=”true” data-mrf-recirculation=”inline-link” data-before-rewrite-localise=”https://www.tomshardware.com/tag/microsoft”>Microsoft‘s book and data-analytics-id=”inline-link” href=”https://www.intel.com/content/www/us/en/security-center/default.html” target=”_blank” data-url=”https://www.intel.com/content/www/us/en/security-center/default.html” referrerpolicy=”no-referrer-when-downgrade” data-hl-processed=”none” data-mrf-recirculation=”inline-link”>published a bevy of software updates for some of its commonly used software on Tuesday. The update pack is large and contains a few noteworthy privilege escalation vulnerabilities. Additionally, there are a few microcode updates for minor issues with contemporary Intel chips, for which the company data-analytics-id=”inline-link” href=”https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111″ target=”_blank” data-url=”https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111″ referrerpolicy=”no-referrer-when-downgrade” data-hl-processed=”none” data-mrf-recirculation=”inline-link”>already posted Linux patches.
The biggest-ticket item is probably the UEFI Server Firmware exploit and denial-of-service, or data-analytics-id=”inline-link” href=”https://www.cve.org/CVERecord?id=CVE-2025-30185″ data-url=”https://www.cve.org/CVERecord?id=CVE-2025-30185″ target=”_blank” referrerpolicy=”no-referrer-when-downgrade” data-hl-processed=”none” data-mrf-recirculation=”inline-link”>CVE-2025-30185, rated 8.3 out of 10….

![[CITYPNG.COM]White Google Play PlayStore Logo – 1500×1500](https://startupnews.fyi/wp-content/uploads/2025/08/CITYPNG.COMWhite-Google-Play-PlayStore-Logo-1500x1500-1-630x630.png)