CVE-2025-13669

6.7 MEDIUM

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by placing malicious DLLs in directories searched by the Altera High Level Synthesis Compiler on Windows. It affects users running the compiler on Windows systems with versions 19.1 through 24.3.

💻 Affected Systems

Products:
  • Altera High Level Synthesis Compiler
Versions: 19.1 through 24.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux and other OS versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with the privileges of the user running the compiler, potentially leading to data theft, system takeover, or lateral movement.

🟠

Likely Case

Local privilege escalation or execution of malicious payloads when users run the compiler from untrusted directories or with malicious files present.

🟢

If Mitigated

Limited impact if users only run the compiler from trusted directories with proper file permissions and security controls.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring access to the file system.
🏢 Internal Only: MEDIUM - Internal users with access to the compiler could exploit this, especially in shared development environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Search order hijacking is a well-known attack pattern. Exploitation requires local access to place malicious DLLs in search paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.4 or later

Vendor Advisory: https://www.altera.com/security/security-advisory/asa-0003

Restart Required: No

Instructions:

1. Download the latest version (24.4+) from Intel/Altera website. 2. Uninstall the vulnerable version. 3. Install the patched version. 4. Verify the installation.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies or application settings to restrict DLL search paths to trusted directories only.

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

Use absolute paths

all

Always run the compiler using absolute paths from trusted directories.

🧯 If You Can't Patch

  • Restrict user permissions to prevent placing files in compiler search directories
  • Monitor for suspicious DLL loading events using Windows Event Log or security tools

🔍 How to Verify

Check if Vulnerable:

Check the compiler version: Run 'hls --version' or check the installed program version in Windows Add/Remove Programs.

Check Version:

hls --version

Verify Fix Applied:

Verify the installed version is 24.4 or later using 'hls --version' command.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) for hls.exe loading DLLs from unusual paths
  • Sysmon Event ID 7 (image loaded) showing DLLs loaded by hls.exe

Network Indicators:

  • None - this is a local file system attack

SIEM Query:

source="windows" EventID=4688 OR EventID=7 Image="*hls.exe" | search DLL="*"

🔗 References

📤 Share & Export