CVE-2025-20622

3.8 LOW

📋 TL;DR

This vulnerability in Intel NPU Drivers for Windows allows unprivileged local users to potentially access sensitive information left in memory after resource release. It affects systems running vulnerable Intel NPU drivers before version 32.0.100.4023 on Windows. Attackers need local access and authenticated user privileges to exploit this information disclosure flaw.

💻 Affected Systems

Products:
  • Intel(R) NPU Drivers for Windows
Versions: All versions before 32.0.100.4023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel NPU hardware and vulnerable driver versions. Requires local access and authenticated user privileges.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive data from previously used NPU resources could be exposed to local attackers, potentially revealing application data, cryptographic keys, or other memory contents.

🟠

Likely Case

Limited information disclosure of residual data from NPU operations, potentially exposing fragments of application data but not full system compromise.

🟢

If Mitigated

No data exposure occurs due to proper memory clearing or patched drivers.

🌐 Internet-Facing: LOW - Requires local access and authenticated user privileges, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers with authenticated access could exploit this for information disclosure within enterprise environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Attack requires local access, authenticated user privileges, and low complexity attack. No special internal knowledge or user interaction needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 32.0.100.4023 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01304.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant or visit Intel Download Center. 2. Check for NPU driver updates. 3. Install version 32.0.100.4023 or later. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit physical and remote local access to systems with vulnerable drivers

User Privilege Reduction

windows

Ensure users only have necessary privileges to reduce attack surface

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into affected systems
  • Monitor for unusual local access patterns or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NPU driver version in Device Manager > System devices > Intel(R) NPU > Driver tab

Check Version:

wmic path win32_pnpentity where "caption like '%NPU%'" get caption, driverVersion

Verify Fix Applied:

Verify driver version is 32.0.100.4023 or later in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual local access patterns
  • Multiple failed privilege escalation attempts
  • Driver loading/unloading anomalies

Network Indicators:

  • Not applicable - local attack only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%NPU%' AND CommandLine CONTAINS 'suspicious'

🔗 References

📤 Share & Export