CVE-2025-20109
Publication date 12 August 2025
Last updated 11 November 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
From the Ubuntu Security Team
Avinash Maddy discovered that some IntelĀ® Processors did not properly isolate or compartmentalize the stream cache mechanisms. A local authenticated user could potentially use this issue to escalate their privileges.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| intel-microcode | 25.10 questing |
Fixed 3.20250812.0ubuntu0.25.10.1
|
| 25.04 plucky |
Fixed 3.20250812.0ubuntu0.25.04.1
|
|
| 24.04 LTS noble |
Fixed 3.20250812.0ubuntu0.24.04.1
|
|
| 22.04 LTS jammy |
Fixed 3.20250812.0ubuntu0.22.04.1
|
|
| 20.04 LTS focal |
Fixed 3.20250812.0ubuntu0.20.04.1+esm1
|
|
| 18.04 LTS bionic |
Fixed 3.20250812.0ubuntu0.18.04.1+esm1
|
|
| 16.04 LTS xenial |
Fixed 3.20250812.0ubuntu0.16.04.1+esm1
|
|
| 14.04 LTS trusty | Ignored see notes |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
rodrigo-zaiden
trusty cannot use intel-microcode during early boot and is therefore generally not updated.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | High |
| Privileges required | Low |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7866-1
- Intel Microcode vulnerabilities
- 10 November 2025