CVE-2025-32088

3.3 LOW

📋 TL;DR

An improper conditions check in Intel QAT Windows software before version 2.6.0 allows authenticated local users to cause denial of service via low-complexity attacks. This affects systems running vulnerable Intel QuickAssist Technology software on Windows. The vulnerability requires local access but no special privileges or user interaction.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) Windows software
Versions: All versions before 2.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT software installed; requires local authenticated access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated local attacker causes system instability or service disruption affecting Intel QAT functionality, potentially impacting dependent applications.

🟠

Likely Case

Local user with standard privileges triggers denial of service condition affecting Intel QAT services, requiring system restart to restore functionality.

🟢

If Mitigated

With proper patching, no impact; with network segmentation and least privilege, limited to isolated system disruption.

🌐 Internet-Facing: LOW (requires local authenticated access, not remotely exploitable)
🏢 Internal Only: MEDIUM (authenticated local users can cause service disruption)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access; low complexity attack according to CVSS

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html

Restart Required: Yes

Instructions:

1. Download Intel QAT software version 2.6.0 or later from Intel's website. 2. Run the installer. 3. Follow on-screen instructions. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts to only trusted personnel to reduce attack surface

Monitor QAT service health

windows

Implement monitoring for Intel QAT service crashes or restarts

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor system logs for unusual QAT service activity or crashes

🔍 How to Verify

Check if Vulnerable:

Check Intel QAT software version via Windows Programs and Features or run 'wmic product get name,version' and look for Intel QAT entries

Check Version:

wmic product where "name like '%Intel%QAT%'" get name,version

Verify Fix Applied:

Verify installed version is 2.6.0 or higher using same method as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Intel QAT service crashes
  • Application errors related to Intel QAT components
  • System event logs showing service failures

Network Indicators:

  • None (local attack only)

SIEM Query:

EventID=7034 OR EventID=1000 AND (SourceName contains 'Intel' OR SourceName contains 'QAT')

🔗 References

📤 Share & Export