CVE-2025-26404

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel DSA software allows authenticated local users to escalate privileges by manipulating the search path. It affects systems running vulnerable versions of Intel DSA software where an authenticated attacker has local access. The issue stems from uncontrolled search path elements that could be exploited to load malicious libraries.

💻 Affected Systems

Products:
  • Intel(R) Driver & Support Assistant (DSA)
Versions: All versions before 25.2.15.9
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local user access. Intel DSA must be installed and running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/root privileges on the affected system, potentially leading to complete system compromise, data theft, or persistence establishment.

🟠

Likely Case

Privileged local user escalates to higher privileges, enabling installation of malware, modification of system configurations, or access to sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and blocked, limiting impact to isolated systems.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this for privilege escalation within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local authenticated access and knowledge of the system. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.2.15.9 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01347.html

Restart Required: No

Instructions:

1. Download Intel DSA version 25.2.15.9 or later from Intel's official website. 2. Run the installer to update the software. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict local user privileges

all

Limit local user accounts to standard user privileges to reduce attack surface.

Remove vulnerable software

windows

Uninstall Intel DSA if not required for system operations.

Control Panel > Programs > Uninstall Intel Driver & Support Assistant

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for suspicious privilege escalation attempts and DLL loading events

🔍 How to Verify

Check if Vulnerable:

Check Intel DSA version in program settings or via 'dsa.exe --version' command.

Check Version:

dsa.exe --version

Verify Fix Applied:

Confirm Intel DSA version is 25.2.15.9 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL loading from non-standard paths
  • Privilege escalation attempts
  • Intel DSA process spawning with elevated privileges

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%dsa%' AND NewProcessName LIKE '%cmd%' OR EventID=4688 AND ProcessName LIKE '%dsa%' AND NewProcessName LIKE '%powershell%'

🔗 References

📤 Share & Export