CVE-2025-24519

6.5 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in Intel QAT Windows software allows authenticated local attackers to escalate privileges and manipulate data. This affects systems running Intel QAT software versions before 2.6.0 on Windows. Attackers need local access but no special knowledge or user interaction.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) Windows software
Versions: All versions before 2.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems with Intel QAT software installed. Requires authenticated local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation leading to data manipulation, persistence, and lateral movement.

🟠

Likely Case

Local authenticated attacker gains elevated privileges to modify system data or configurations.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation in place.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable.
🏢 Internal Only: HIGH - Local attackers can exploit this for privilege escalation and data manipulation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Attack complexity is low per CVSS, but requires authenticated local access. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html

Restart Required: Yes

Instructions:

1. Download Intel QAT software version 2.6.0 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local user access to systems with Intel QAT software to trusted personnel only.

Disable QAT Service

windows

Temporarily disable the Intel QAT service if not required for system functionality.

sc stop "Intel(R) QAT Service"
sc config "Intel(R) QAT Service" start= disabled

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for unusual privilege escalation attempts and system modifications

🔍 How to Verify

Check if Vulnerable:

Check Intel QAT software version in Programs and Features or via command: wmic product where "name like '%Intel%QAT%'" get version

Check Version:

wmic product where "name like '%Intel%QAT%'" get version

Verify Fix Applied:

Verify installed version is 2.6.0 or later using same command and check that no buffer overflow events are logged.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • Application crashes related to Intel QAT processes
  • Unexpected system modifications by authenticated users

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%qat%' AND NewProcessName LIKE '%system%' OR EventID=4672 AND SubjectUserName NOT IN (trusted_users)

🔗 References

📤 Share & Export