CVE-2025-20087

6.7 MEDIUM

📋 TL;DR

This vulnerability involves incorrect default permissions in Intel oneAPI DPC++/C++ Compiler installers, allowing authenticated local users to potentially escalate privileges. It affects systems where these compilers are installed with vulnerable versions. The risk is limited to authenticated users with local access to affected systems.

💻 Affected Systems

Products:
  • Intel oneAPI DPC++/C++ Compiler
Versions: Specific versions mentioned in Intel advisory INTEL-SA-01285
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where the vulnerable installer was used. Requires authenticated local access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, potentially compromising the entire machine and accessing sensitive data or installing persistent malware.

🟠

Likely Case

A local authenticated user could elevate their privileges to administrator/root level, allowing them to modify system configurations, install software, or access other user data.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited as only authorized users would have access to the vulnerable components.

🌐 Internet-Facing: LOW - This vulnerability requires local authenticated access, making direct internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this to escalate privileges, particularly in environments with shared or multi-user systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local authenticated access and knowledge of the vulnerable permissions. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated versions specified in Intel advisory INTEL-SA-01285

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html

Restart Required: No

Instructions:

1. Review Intel advisory INTEL-SA-01285 for affected versions. 2. Download and install the updated compiler version from Intel's official distribution channels. 3. Verify the installation completed successfully.

🔧 Temporary Workarounds

Adjust installer permissions

all

Manually correct the permissions on the vulnerable installer files to restrict write access

chmod 755 installer_file (Linux)
icacls installer_file /deny Users:F (Windows)

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute or modify compiler installer files
  • Monitor for suspicious privilege escalation attempts and file permission changes related to compiler components

🔍 How to Verify

Check if Vulnerable:

Check the installed compiler version against the vulnerable versions listed in Intel advisory INTEL-SA-01285

Check Version:

dpcpp --version (Linux) or check installed programs in Control Panel (Windows)

Verify Fix Applied:

Verify the compiler version has been updated to a patched version and check installer file permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Modifications to compiler installer files or permissions
  • Suspicious process execution from compiler directories

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 OR ProcessName contains 'dpcpp' OR FilePath contains 'oneAPI' AND (PrivilegeChange OR PermissionModification)

🔗 References

📤 Share & Export