CVE-2025-30509

3.8 LOW

📋 TL;DR

This vulnerability in Intel QuickAssist Technology software allows authenticated local users to escalate privileges through improper input validation. It affects systems running Intel QAT software versions before 2.6.0. The vulnerability enables data manipulation but doesn't affect confidentiality or availability.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) software
Versions: All versions before 2.6.0
Operating Systems: Linux, Windows, Other supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel QAT software installation and authenticated local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains elevated privileges to manipulate system data, potentially modifying critical files or configurations.

🟠

Likely Case

Local authenticated user exploits the vulnerability to modify application data or gain unauthorized access to restricted functions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated data manipulation within the QAT application context.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access and low complexity attack according to CVSS metrics.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html

Restart Required: Yes

Instructions:

1. Download Intel QAT software version 2.6.0 or later from Intel's website. 2. Stop all QAT services. 3. Install the updated software package. 4. Restart the system. 5. Verify the new version is active.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running Intel QAT software to reduce attack surface.

Monitor QAT Processes

all

Implement monitoring for unusual QAT process activity or privilege escalation attempts.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can interact with QAT software
  • Deploy application control solutions to restrict execution of QAT binaries to authorized processes only

🔍 How to Verify

Check if Vulnerable:

Check Intel QAT software version using 'qat_service -v' or examine installed packages for versions below 2.6.0.

Check Version:

qat_service -v 2>&1 | grep -i version

Verify Fix Applied:

Verify installed version is 2.6.0 or higher using version check command and ensure no privilege escalation attempts are detected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in system logs
  • QAT service errors or crashes
  • Authentication events from unexpected users

Network Indicators:

  • Local privilege escalation typically has no network indicators

SIEM Query:

source="system_logs" AND (event_type="privilege_escalation" OR process_name="qat*")

🔗 References

📤 Share & Export