CVE-2025-26402

6.5 MEDIUM

📋 TL;DR

This vulnerability in Intel NPU drivers allows unprivileged user applications to cause a denial of service via local access. It affects systems with vulnerable Intel NPU drivers where an authenticated user can execute low-complexity attacks without special knowledge or user interaction.

💻 Affected Systems

Products:
  • Intel NPU Drivers
Versions: Specific versions not detailed in advisory; check Intel SA-01304
Operating Systems: Windows, Linux systems with Intel NPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel NPU hardware and vulnerable driver versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability requiring reboot, disrupting critical services and operations.

🟠

Likely Case

Local denial of service affecting NPU functionality and dependent applications.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place.

🌐 Internet-Facing: LOW - requires local access and authenticated user.
🏢 Internal Only: MEDIUM - authenticated users can cause local denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access and local execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Intel SA-01304 for specific patched versions

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01304.html

Restart Required: Yes

Instructions:

1. Visit Intel Security Advisory SA-01304. 2. Identify affected driver versions. 3. Download and install updated NPU drivers from Intel. 4. Reboot system.

🔧 Temporary Workarounds

Restrict User Privileges

all

Limit local user privileges to reduce attack surface

Monitor NPU Driver Processes

all

Implement monitoring for unusual NPU driver activity

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles
  • Monitor systems for denial of service indicators and NPU driver crashes

🔍 How to Verify

Check if Vulnerable:

Check Intel NPU driver version against advisory SA-01304

Check Version:

Windows: Check Device Manager > System devices > Intel NPU. Linux: Check driver version via system logs or vendor tools.

Verify Fix Applied:

Verify NPU driver version matches patched version from Intel advisory

📡 Detection & Monitoring

Log Indicators:

  • NPU driver crashes
  • System event logs showing driver failures
  • Application errors related to NPU functionality

Network Indicators:

  • None - local vulnerability only

SIEM Query:

EventID for driver crashes OR process termination events for NPU-related executables

🔗 References

📤 Share & Export