CVE-2025-31948

3.3 LOW

📋 TL;DR

An improper input validation vulnerability in Intel oneAPI Math Kernel Library versions before 2025.2 allows local authenticated users to cause denial of service via low-complexity attacks. This affects systems running vulnerable versions of the library in user applications.

💻 Affected Systems

Products:
  • Intel oneAPI Math Kernel Library
Versions: All versions before 2025.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the vulnerable library functions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker crashes applications using the vulnerable library, causing temporary service disruption.

🟠

Likely Case

Accidental triggering by legitimate users or malicious local users causing application instability.

🟢

If Mitigated

Minimal impact with proper patching and application isolation.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local authenticated users can potentially disrupt applications using the library.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access and knowledge of vulnerable library usage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01366.html

Restart Required: No

Instructions:

1. Download Intel oneAPI Math Kernel Library version 2025.2 or later from Intel's website. 2. Install the updated library following Intel's installation guide. 3. Recompile or restart applications using the library.

🔧 Temporary Workarounds

Application Isolation

all

Restrict local user access to applications using the vulnerable library.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can run affected applications.
  • Monitor application logs for abnormal termination patterns.

🔍 How to Verify

Check if Vulnerable:

Check installed version of Intel oneAPI Math Kernel Library using package manager or library version query.

Check Version:

On Linux: `ldconfig -p | grep mkl` or check package manager. On Windows: Check installed programs list.

Verify Fix Applied:

Verify version is 2025.2 or later and test application functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal termination of processes using Intel MKL

Network Indicators:

  • None - local attack only

SIEM Query:

Process termination events for applications known to use Intel MKL

🔗 References

📤 Share & Export