CVE-2025-27560
Infinite Loop Vulnerability in Intel Kernel Causing DoS
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | platform | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a loop with an unreachable exit condition, effectively creating an 'infinite loop' within some Intel(R) platforms at the kernel level (Ring 0). This means the system software can get stuck in this loop, potentially causing a denial of service.
An attacker with privileged user access and low complexity attack methods can exploit this vulnerability locally without requiring special internal knowledge or user interaction.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS) condition, which affects the availability of the vulnerable system.
There is no impact on confidentiality or integrity according to the description.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know