Intel and AMD’s February 2026 Patch Tuesday advisories address more than 80 vulnerabilities found recently in their products.
Intel has published 18 new advisories covering more than 30 vulnerabilities. Four advisories have an overall severity rating of high.
One of these advisories describes TDX vulnerabilities discovered in collaboration with Google, including a flaw that could lead to full compromise.
The other high-severity advisories describe privilege escalation issues in Server Firmware Update Utility, DoS and information disclosure flaws in Converged Security and Management Engine (CSME), and privilege escalation and DoS issues in Quick Assist Technology.
Medium-severity vulnerabilities have been patched by Intel in server firmware, AI Playground software, Server System Firmware Update Utility, Memory and Storage Tool, Chipset Driver Software installers, Ethernet Adapters 800 Series Controllers, VTune Profiler, TDX, Optane Persistent Memory, Battery Life Diagnostic Tool, and NPU Drivers.
Exploitation of these security holes can lead to DoS and privilege escalation.
Intel has also released a few low-severity advisories, including for vulnerabilities found in processors, graphics drivers, and 800 Series Ethernet drivers.
AMD has published seven new advisories to address more than 50 CVEs. One advisory describes 14 vulnerabilities (with CVEs ranging between 2021 and 2025) in Athlon and Ryzen processors. Exploitation of the flaws can lead to unauthorized access, privilege escalation, arbitrary code execution, denial of service, and information disclosure.
Fifteen vulnerabilities have been described by AMD in the company’s February 2026 advisory for graphics drivers. In addition, 19 flaws have been resolved by the company in Epyc and Epyc Embedded series processors.
AMD also announced patches for a high-severity privilege escalation (and potential code execution) vulnerability in the uProf performance analysis tool suite, and two similar-impact issues in the Vivado Design Suite.
Two advisories do not carry any CVE identifiers. One of them describes timing-based side channels targeting NVIDIA products, which AMD says do not impact its own GPUs.
The second addresses a physical optical side channel that could allow an attacker to recover plaintext configuration data from encrypted bitstreams. “This is a physical back side attack and is outside of the threat model for AMD 7-series FPGAs,” AMD said.
Nvidia has yet to publish any security advisories for February 2026.
Related: Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
Related: Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel

