CVE-2025-31948
📋 TL;DR
An improper input validation vulnerability in Intel oneAPI Math Kernel Library versions before 2025.2 allows local authenticated users to cause denial of service via low-complexity attacks. This affects systems running vulnerable versions of the library in user applications.
💻 Affected Systems
- Intel oneAPI Math Kernel Library
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local authenticated attacker crashes applications using the vulnerable library, causing temporary service disruption.
Likely Case
Accidental triggering by legitimate users or malicious local users causing application instability.
If Mitigated
Minimal impact with proper patching and application isolation.
🎯 Exploit Status
Requires local authenticated access and knowledge of vulnerable library usage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.2 or later
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01366.html
Restart Required: No
Instructions:
1. Download Intel oneAPI Math Kernel Library version 2025.2 or later from Intel's website. 2. Install the updated library following Intel's installation guide. 3. Recompile or restart applications using the library.
🔧 Temporary Workarounds
Application Isolation
allRestrict local user access to applications using the vulnerable library.
🧯 If You Can't Patch
- Implement strict access controls to limit which users can run affected applications.
- Monitor application logs for abnormal termination patterns.
🔍 How to Verify
Check if Vulnerable:
Check installed version of Intel oneAPI Math Kernel Library using package manager or library version query.
Check Version:
On Linux: `ldconfig -p | grep mkl` or check package manager. On Windows: Check installed programs list.
Verify Fix Applied:
Verify version is 2025.2 or later and test application functionality.
📡 Detection & Monitoring
Log Indicators:
- Application crashes or abnormal termination of processes using Intel MKL
Network Indicators:
- None - local attack only
SIEM Query:
Process termination events for applications known to use Intel MKL