CVE-2025-32038

6.7 MEDIUM

📋 TL;DR

This CVE describes an uncontrolled search path vulnerability in Intel's FPGA Support Package for the oneAPI DPC++/C++ Compiler. It allows local authenticated attackers to escalate privileges by manipulating the DLL search order. Only users running the vulnerable Intel compiler software on Windows systems are affected.

💻 Affected Systems

Products:
  • Intel FPGA Support Package for Intel oneAPI DPC++/C++ Compiler
Versions: All versions before 2025.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows due to DLL search order behavior. Requires the FPGA Support Package component to be installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM/administrator privileges, compromising the entire system's confidentiality, integrity, and availability.

🟠

Likely Case

Local authenticated user with basic privileges gains elevated permissions to install software, modify system files, or access restricted data.

🟢

If Mitigated

Attack fails due to proper access controls, limited user permissions, or the vulnerability being patched.

🌐 Internet-Facing: LOW - Requires local access and authenticated user interaction.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this if they have basic privileges and the vulnerable software is installed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires local authenticated access, user interaction, and specific conditions to manipulate DLL search paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.0.1 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01364.html

Restart Required: Yes

Instructions:

1. Download Intel oneAPI DPC++/C++ Compiler version 2025.0.1 or later from Intel's website. 2. Run the installer and follow prompts to update. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Set SafeDllSearchMode registry key to force Windows to search system directories first

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Remove vulnerable software

windows

Uninstall the FPGA Support Package component if not required

Control Panel > Programs > Uninstall a program > Select Intel oneAPI DPC++/C++ Compiler > Change > Modify installation > Deselect FPGA Support Package

🧯 If You Can't Patch

  • Restrict local user permissions to prevent execution of untrusted binaries
  • Implement application whitelisting to block unauthorized DLL loading

🔍 How to Verify

Check if Vulnerable:

Check installed version of Intel oneAPI DPC++/C++ Compiler via Programs and Features in Control Panel

Check Version:

wmic product where "name like '%Intel oneAPI DPC++%'" get version

Verify Fix Applied:

Verify version is 2025.0.1 or later in Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual paths (Event ID 7 in Microsoft-Windows-Diagnostics-Performance)
  • Process Monitor logs showing DLL hijacking attempts

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=7 AND (ProcessName="*fpga*" OR ProcessName="*dpc++*") AND ImagePath NOT CONTAINS "C:\Windows" AND ImagePath NOT CONTAINS "C:\Program Files\Intel"

🔗 References

📤 Share & Export