threatpost[.]com/intel-patches-local-eop-vulnerability-impacting-windows-7/119248/
Intel issued an important security patch Monday for a vulnerability that could allow hackers to execute arbitrary code on targeted systems running Windows 7. The bug, located in Intel’s HD graphics Windows kernel driver, leaves affected systems open to a local privilege escalation attacks that could give criminals the ability take control of targeted systems. Specifically impacted, according to Intel, are users of Intel Graphics Driver for Microsoft Windows prior to March 28, 2016. Intel describes the flaw as one which, if exploited, “would directly impact the confidentiality, integrity or availability of user’s data or processing resources.”
Cisco Talos said that Windows 8 and Windows 10 systems are also impacted, in that an attacker could crash (denial of service) those system, but would not be able to execute arbitrary code as with Windows 7 systems and prior versions of Windows.
The article includes a link to a driver download page at Intel's site, but the list of CPUs the drivers on that page apply to is limited. You can also open Control Panel -> Device Mgr., find the Intel Display adapter, right click it, & select Update Driver Software, allowing Windows to search online. And/or you can Google on your CPU model, which should get you the Intel Ark page -- it has the specs for the CPU, plus usually on the left side of the page there's a link to drivers. The Intel site also has a tool to find the latest Intel drivers, but your mileage may vary -- I haven't had good luck with it personally.