CVE-2025-32001

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Processor Identification Utility before version 8.0.43 allows local authenticated attackers to escalate privileges via DLL hijacking in the application's search path. It affects users running vulnerable versions of the utility on Windows systems. Successful exploitation requires user interaction and local access.

💻 Affected Systems

Products:
  • Intel Processor Identification Utility
Versions: Versions before 8.0.43
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access and user interaction. Not typically installed by default on most systems.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence installation, and disabling of security controls.

🟠

Likely Case

Local authenticated user elevates to administrator privileges to install malware, modify system settings, or access protected resources.

🟢

If Mitigated

Attack fails due to proper access controls, user awareness preventing interaction, or security software blocking suspicious DLL loads.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires authenticated user, local access, and user interaction. Attack complexity is high per CVSS description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.43 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01334.html

Restart Required: No

Instructions:

1. Download Intel Processor Identification Utility version 8.0.43 or later from Intel's website. 2. Run the installer. 3. Follow installation prompts. 4. Verify successful update.

🔧 Temporary Workarounds

Remove vulnerable utility

windows

Uninstall Intel Processor Identification Utility if not required

Control Panel > Programs > Uninstall a program > Select Intel Processor Identification Utility > Uninstall

Restrict write permissions

windows

Set restrictive permissions on directories where utility searches for DLLs

icacls "C:\Program Files\Intel\Processor Identification Utility" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Restrict user permissions to prevent local authenticated access to vulnerable systems
  • Implement application whitelisting to block execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check installed version via Control Panel > Programs or run the utility and check About section

Check Version:

wmic product where name="Intel(R) Processor Identification Utility" get version

Verify Fix Applied:

Confirm version is 8.0.43 or later in program properties or About dialog

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for cpuz.exe with suspicious parent processes
  • DLL load events from unexpected locations for cpuz.exe

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="*security*" AND (process_name="cpuz.exe" AND (parent_process!="explorer.exe" OR image_load_path!="C:\\Program Files\\Intel\\*"))

🔗 References

📤 Share & Export