Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities
Intel and AMD release 70 vulnerability patches across product portfolios on May 2026 Patch Tuesday.
Summary
Intel and AMD released security advisories on May 2026 Patch Tuesday addressing 70 vulnerabilities combined. Intel patched 24 flaws across 13 advisories including a critical buffer overflow (CVE-2026-20794, CVSS 9.3) in Data Center Graphics Driver for VMware ESXi. AMD patched 45 vulnerabilities across 15 advisories, including a critical flaw (CVE-2026-0481, CVSS 9.2) in AMD Device Metrics Exporter exposing GPU configuration to unauthenticated remote attackers.
Full text
Intel and AMD have released over two dozen advisories on May 2026 Patch Tuesday, addressing 70 vulnerabilities across their product portfolios. Intel published 13 advisories describing 24 security defects, including one critical and eight high-severity flaws. The critical bug, tracked as CVE-2026-20794 (CVSS score of 9.3), is described as a buffer overflow issue in the Data Center Graphics Driver for VMware ESXi software that could be exploited for privilege escalation and potentially for code execution. Intel’s update for the product also resolves two high-severity out-of-bounds write and read weaknesses that could lead to denial-of-service (DoS) conditions and potentially to data corruption or disclosure. The chip maker also addressed high-severity vulnerabilities in Vision software, Endpoint Management Assistant (EMA), UEFI firmware for the Slim Bootloader, and QuickAssist Technology (QAT) software drivers for Windows. Successful exploitation of the flaws could lead to DoS conditions and privilege escalation, and potentially arbitrary code execution.Advertisement. Scroll to continue reading. The remaining security defects addressed by Intel on Tuesday are medium-severity bugs affecting AI Playground, Display Virtualization for Windows driver, 800 Series Ethernet Linux driver, NPU drivers, UEFI firmware, Server Firmware Update Utility, QAT drivers for Windows, and some Intel processors. AMD published 15 advisories covering 45 vulnerabilities, including one critical-severity flaw and two dozen high-severity issues. Tracked as CVE-2026-0481 (CVSS score of 9.2), the critical bug impacts the AMD Device Metrics Exporter (ROCm ecosystem), which exposes port 50061 on all network interfaces by default, allowing unauthenticated users to access the GPU-Agent gRPC(Google Remote Procedure call) server. “Unrestricted IP address binding in the AMD Device Metrics Exporter (ROCm ecosystem) could allow a remote attacker to perform unauthorized changes to the GPU configuration, potentially resulting in loss of availability,” AMD explains. The company has addressed high-severity weaknesses within Secure Processor (ASP), general-purpose input/output controller (GPIO), Revenera InstallShield, Ionic cloud driver for ESXi, RAID driver, chipset drivers, CPU operation cache on Zen 2‑based products, graphics and datacenter accelerator products, EPYC and EPYC Embedded processor platforms, and some optional software tools. Successful exploitation of these issues could lead to privilege escalation, arbitrary code execution, and arbitrary read/write access to the victim VM/process data. Related: ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA Related: Microsoft Patches 137 Vulnerabilities Related: Adobe Patches 52 Vulnerabilities in 10 Products Related: SAP Patches Critical S/4HANA, Commerce Vulnerabilities Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire West Pharmaceutical Services Hit by Disruptive Ransomware AttackSAP Patches Critical S/4HANA, Commerce VulnerabilitiesTanStack, Mistral AI, UiPath Hit in Fresh Supply Chain AttackSkoda Data Breach Hits Online Shop CustomersSailPoint Discloses GitHub Repository HackCheckmarx Jenkins AST Plugin Compromised in Supply Chain AttackResurrected ‘Crimenetwork’ Marketplace Taken Down, Administrator ArrestedOver 500 Organizations Hit in Years-Long Phishing Campaign Latest News Fortinet, Ivanti Patch Critical VulnerabilitiesHundreds of Malicious Packages Force RubyGems to Suspend RegistrationsICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISAMicrosoft Patches 137 VulnerabilitiesExaforce Raises $125 Million for Agentic SOC PlatformAdobe Patches 52 Vulnerabilities in 10 ProductsWhite Circle Raises $11 Million for AI Control PlatformBWH Hotels Says Hackers Had Access to Reservation Data for 6 Months Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-20794
- cve — CVE-2026-0481