Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities

0
Medium
Vulnerability
Published: Wed May 13 2026 (05/13/2026, 08:37:34 UTC)
Source: SecurityWeek

Description

Intel and AMD released security advisories addressing a total of 70 vulnerabilities across their product portfolios. Intel fixed 24 defects including one critical buffer overflow in the Data Center Graphics Driver for VMware ESXi that could lead to privilege escalation and code execution. AMD patched 45 vulnerabilities including a critical issue in the AMD Device Metrics Exporter that allows unauthenticated remote access to GPU configuration, potentially causing denial of service. Other vulnerabilities include high-severity flaws that could enable privilege escalation, denial of service, arbitrary code execution, and data disclosure. No known exploits in the wild have been reported at this time. The vulnerabilities affect a wide range of hardware and software components including firmware, drivers, and management tools. Patch status is not explicitly stated in the source, so users should consult the official advisories for remediation details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/13/2026, 08:51:35 UTC

Technical Analysis

On May 2026 Patch Tuesday, Intel and AMD published over two dozen advisories addressing 70 vulnerabilities in their products. Intel disclosed 13 advisories covering 24 defects, including a critical buffer overflow (CVE-2026-20794, CVSS 9.3) in the Data Center Graphics Driver for VMware ESXi that could be exploited for privilege escalation and code execution. Additional high-severity Intel flaws involve out-of-bounds read/write leading to denial of service and potential data corruption. AMD released 15 advisories covering 45 vulnerabilities, including a critical flaw (CVE-2026-0481, CVSS 9.2) in the AMD Device Metrics Exporter that exposes a network port allowing unauthenticated remote access to GPU configuration, risking availability loss. Other AMD issues include high-severity vulnerabilities affecting processors, drivers, and software tools that could result in privilege escalation, arbitrary code execution, or unauthorized data access. The advisories cover a broad range of components such as firmware, drivers, and management utilities. No exploits in the wild have been reported. Patch availability is implied but not explicitly confirmed in the source content; users should verify with vendor advisories.

Potential Impact

The vulnerabilities include critical buffer overflow and unrestricted network access flaws that could allow attackers to escalate privileges, execute arbitrary code, cause denial of service, or access sensitive data. The Intel critical vulnerability affects the Data Center Graphics Driver for VMware ESXi, potentially impacting virtualization environments. The AMD critical vulnerability allows unauthenticated remote access to GPU configuration via an exposed network port, risking denial of service. High-severity vulnerabilities in both vendors' products could lead to privilege escalation, arbitrary code execution, and data disclosure or corruption. No known active exploitation has been reported, but the potential impact on data center and cloud environments is significant.

Mitigation Recommendations

Patch status is not explicitly confirmed in the provided source. Users should consult the official Intel and AMD security advisories linked in the source article to obtain and apply the relevant patches. Given the critical nature of some vulnerabilities, timely application of vendor updates is strongly recommended. Monitor vendor communications for any updates on exploit activity or additional mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/chipmaker-patch-tuesday-intel-and-amd-patch-70-vulnerabilities/","fetched":true,"fetchedAt":"2026-05-13T08:51:24.417Z","wordCount":991}

Threat ID: 6a043b8ccbff5d86109e4974

Added to database: 5/13/2026, 8:51:24 AM

Last enriched: 5/13/2026, 8:51:35 AM

Last updated: 5/13/2026, 8:51:41 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses