CVE-2025-20087
📋 TL;DR
This vulnerability involves incorrect default permissions in Intel oneAPI DPC++/C++ Compiler installers, allowing authenticated local users to potentially escalate privileges. It affects systems where these compilers are installed with vulnerable versions. The risk is limited to authenticated users with local access to affected systems.
💻 Affected Systems
- Intel oneAPI DPC++/C++ Compiler
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could gain SYSTEM/root privileges on the affected system, potentially compromising the entire machine and accessing sensitive data or installing persistent malware.
Likely Case
A local authenticated user could elevate their privileges to administrator/root level, allowing them to modify system configurations, install software, or access other user data.
If Mitigated
With proper access controls and least privilege principles, the impact is limited as only authorized users would have access to the vulnerable components.
🎯 Exploit Status
Exploitation requires local authenticated access and knowledge of the vulnerable permissions. No public exploit code is known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Updated versions specified in Intel advisory INTEL-SA-01285
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html
Restart Required: No
Instructions:
1. Review Intel advisory INTEL-SA-01285 for affected versions. 2. Download and install the updated compiler version from Intel's official distribution channels. 3. Verify the installation completed successfully.
🔧 Temporary Workarounds
Adjust installer permissions
allManually correct the permissions on the vulnerable installer files to restrict write access
chmod 755 installer_file (Linux)
icacls installer_file /deny Users:F (Windows)
🧯 If You Can't Patch
- Implement strict access controls to limit which users can execute or modify compiler installer files
- Monitor for suspicious privilege escalation attempts and file permission changes related to compiler components
🔍 How to Verify
Check if Vulnerable:
Check the installed compiler version against the vulnerable versions listed in Intel advisory INTEL-SA-01285
Check Version:
dpcpp --version (Linux) or check installed programs in Control Panel (Windows)
Verify Fix Applied:
Verify the compiler version has been updated to a patched version and check installer file permissions are properly restricted
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- Modifications to compiler installer files or permissions
- Suspicious process execution from compiler directories
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
EventID=4688 OR ProcessName contains 'dpcpp' OR FilePath contains 'oneAPI' AND (PrivilegeChange OR PermissionModification)