Protection Mechanism Failure Affecting firmware-nonfree package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-FIRMWARENONFREE-14038363
  • published17 Nov 2025
  • disclosed11 Nov 2025

Introduced: 11 Nov 2025

NewCVE-2025-26402  (opens in a new tab)
CWE-693  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 firmware-nonfree.

NVD Description

Note: Versions mentioned in the description apply only to the upstream firmware-nonfree package and not the firmware-nonfree package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Protection mechanism failure for some Intel(R) NPU Drivers within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.