CVE-2025-14599

6.7 MEDIUM

📋 TL;DR

This CVE describes a Search Order Hijacking vulnerability in Altera Quartus Prime installers on Windows. Attackers can place malicious DLLs in directories searched before legitimate ones, potentially executing arbitrary code when the installer runs. Affected users include anyone running Quartus Prime Standard or Lite versions 23.1 through 24.1 on Windows.

💻 Affected Systems

Products:
  • Altera Quartus Prime Standard Installer (SFX)
  • Altera Quartus Prime Lite Installer (SFX)
Versions: 23.1 through 24.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires user interaction to run installer from vulnerable location.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with installer privileges, potentially leading to persistent backdoors, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or malware execution when users run the installer from untrusted directories, potentially compromising development environments.

🟢

If Mitigated

No impact if installers are only run from trusted locations with proper file permissions and security controls.

🌐 Internet-Facing: LOW - This requires local access or convincing users to download and run installers from malicious locations.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges or deploy malware within development environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to place malicious DLLs in directories searched before legitimate ones. User must run the installer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 24.1

Vendor Advisory: https://www.altera.com/security/security-advisory/asa-0005

Restart Required: No

Instructions:

1. Download latest version from official Intel/Altera website. 2. Uninstall affected versions. 3. Install patched version. 4. Verify installation integrity.

🔧 Temporary Workarounds

Restrict installer execution locations

windows

Only run Quartus Prime installers from trusted, controlled directories with proper permissions.

Use application whitelisting

windows

Configure Windows Defender Application Control or similar to only allow signed installers from trusted paths.

🧯 If You Can't Patch

  • Run installers only from trusted, write-protected directories
  • Implement strict file permissions to prevent unauthorized DLL placement in search paths

🔍 How to Verify

Check if Vulnerable:

Check Quartus Prime version: Open Quartus Prime, go to Help > About. If version is between 23.1 and 24.1 inclusive, you are vulnerable.

Check Version:

In Quartus Prime: Help > About shows version. Command line: Not directly available.

Verify Fix Applied:

After updating, verify version is above 24.1 in Help > About. Test installer behavior from various directories.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unexpected directories
  • Process Monitor logs showing installer searching multiple directories for DLLs

Network Indicators:

  • Unusual outbound connections from installer process
  • DNS queries for suspicious domains during installation

SIEM Query:

Process creation where parent process contains 'quartus' AND command line contains suspicious paths OR DLL loading from non-standard directories

🔗 References

📤 Share & Export