Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27560: Denial of Service in Intel(R) Platform

0
Medium
VulnerabilityCVE-2025-27560cvecve-2025-27560
Published: Tue Feb 10 2026 (02/10/2026, 16:25:26 UTC)
Source: CVE Database V5
Product: Intel(R) Platform

Description

Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Kernel may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 17:01:28 UTC

Technical Analysis

CVE-2025-27560 is a denial of service vulnerability identified in certain Intel(R) platforms operating at the kernel level (Ring 0). The flaw arises from a loop construct within the kernel code that contains an unreachable exit condition, effectively creating an infinite loop scenario. When triggered by a system software adversary possessing privileged user access, this infinite loop causes the kernel to hang or become unresponsive, leading to a denial of service condition. The attack vector is local, requiring the attacker to have high privileges on the system, but it does not require user interaction or special internal knowledge beyond privileged access. The vulnerability does not compromise confidentiality or integrity but severely impacts system availability, potentially causing system crashes or hangs that disrupt normal operations. The CVSS 4.0 score of 6.7 reflects a medium severity, considering the local attack vector, low attack complexity, and high impact on availability. No public exploits are currently known, and no patches have been linked yet, indicating that mitigation relies on vendor updates and access control measures. This vulnerability could affect a wide range of Intel-based systems, especially those running kernel-level software that interacts with the affected code path.

Potential Impact

For European organizations, the primary impact of CVE-2025-27560 is operational disruption due to system unavailability. Critical infrastructure, data centers, and enterprise environments relying on affected Intel platforms could experience downtime if the vulnerability is exploited. Since the attack requires privileged access, insider threats or compromised administrative accounts pose the greatest risk. The denial of service could interrupt business continuity, delay services, and increase recovery costs. Although confidentiality and integrity are not directly affected, the availability impact could indirectly affect service-level agreements and operational trust. Organizations with high dependency on Intel hardware for critical workloads, such as financial institutions, healthcare providers, and government agencies, may face significant challenges maintaining uptime. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Apply security patches from Intel promptly once they become available to address the infinite loop condition in the kernel. 2. Restrict privileged user access rigorously using the principle of least privilege and strong authentication mechanisms to reduce the risk of local exploitation. 3. Implement robust monitoring and alerting for unusual kernel behavior or system hangs that may indicate exploitation attempts. 4. Use kernel integrity verification tools and endpoint detection and response (EDR) solutions to detect anomalous activity at the kernel level. 5. Conduct regular audits of privileged accounts and system logs to identify potential insider threats or unauthorized access. 6. Employ virtualization or containerization to isolate critical workloads, limiting the impact of a potential denial of service. 7. Maintain comprehensive incident response plans that include scenarios for kernel-level denial of service events. 8. Educate system administrators about the vulnerability and the importance of cautious privilege management. 9. Consider hardware and firmware updates if recommended by Intel as part of the mitigation strategy. 10. Coordinate with Intel and security vendors for timely threat intelligence and mitigation guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:18:07.413Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5d4b57a58fa119cf3b

Added to database: 2/10/2026, 4:31:25 PM

Last enriched: 2/10/2026, 5:01:28 PM

Last updated: 2/21/2026, 12:22:20 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats