CVE-2025-27712

5.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Neural Compressor software allows authenticated local users to escalate privileges via improper input neutralization. Attackers could gain higher system privileges than intended, but require user interaction and local access. Only users running vulnerable versions of Intel Neural Compressor are affected.

💻 Affected Systems

Products:
  • Intel Neural Compressor
Versions: All versions before v3.4
Operating Systems: Windows, Linux, macOS (where Intel Neural Compressor is supported)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Neural Compressor to be installed and executed by authenticated local users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains elevated system privileges, potentially compromising the entire system.

🟠

Likely Case

Limited privilege escalation within the application context, allowing unauthorized access to restricted functions.

🟢

If Mitigated

No impact if patched or if proper access controls prevent local user execution.

🌐 Internet-Facing: LOW - Requires local access and user interaction, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit if running vulnerable software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates low attack complexity but requires authenticated local access and user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.4 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01365.html

Restart Required: Yes

Instructions:

1. Download Intel Neural Compressor v3.4 or later from Intel's official distribution channels. 2. Uninstall previous vulnerable versions. 3. Install the updated version. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit which users can execute Intel Neural Compressor software on affected systems.

Application Whitelisting

all

Implement application control policies to prevent execution of vulnerable Intel Neural Compressor versions.

🧯 If You Can't Patch

  • Remove Intel Neural Compressor from systems where it's not essential
  • Implement strict least-privilege access controls for local users

🔍 How to Verify

Check if Vulnerable:

Check Intel Neural Compressor version: On Linux/macOS run 'python -c "import neural_compressor; print(neural_compressor.__version__)"', on Windows check installed programs list.

Check Version:

python -c "import neural_compressor; print(neural_compressor.__version__)"

Verify Fix Applied:

Confirm version is v3.4 or higher using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in system logs
  • Intel Neural Compressor process spawning with elevated privileges

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Process creation events where parent process is Intel Neural Compressor with elevated privileges

🔗 References

📤 Share & Export