CVE-2025-30182

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Distribution for Python installers allows local attackers to escalate privileges by manipulating the search path. It affects users running vulnerable versions of the software on Windows systems. Attack requires local access and user interaction to exploit.

💻 Affected Systems

Products:
  • Intel Distribution for Python
Versions: All versions before 2025.2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installers; requires local access and user interaction to trigger the vulnerable installer.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation to SYSTEM/root level, enabling installation of malware, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative rights on the affected system, potentially leading to lateral movement within the network.

🟢

If Mitigated

Limited impact due to user interaction requirement and local access constraints; proper patching prevents exploitation entirely.

🌐 Internet-Facing: LOW - Requires local access and user interaction, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit if user interaction is achieved through social engineering or existing foothold.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires authenticated user, local access, and user interaction with high complexity attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01382.html

Restart Required: No

Instructions:

1. Download Intel Distribution for Python version 2025.2.0 or later from official Intel sources. 2. Uninstall previous vulnerable versions. 3. Install the updated version. 4. Verify installation with version check.

🔧 Temporary Workarounds

Restrict installer execution

windows

Prevent execution of vulnerable Intel Python installers through application control policies

Using AppLocker or Windows Defender Application Control to block execution of vulnerable installer files

Remove vulnerable versions

windows

Uninstall Intel Distribution for Python if not required

Control Panel > Programs > Uninstall Intel Distribution for Python

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users don't have administrative rights
  • Monitor for suspicious installer execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed Intel Distribution for Python version via Control Panel or command line: python -c "import sys; print(sys.version)" and look for Intel distribution markers

Check Version:

python -c "import sys; print(sys.version)"

Verify Fix Applied:

Confirm version is 2025.2.0 or later using same version check command

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Intel Python installer execution
  • Privilege escalation attempts following installer execution
  • Unusual process creation from Python installer paths

Network Indicators:

  • No network indicators - local vulnerability only

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%intelpython%' OR CommandLine LIKE '%intelpython%')

🔗 References

📤 Share & Export