CVE-2025-32449

6.7 MEDIUM

📋 TL;DR

This CVE describes an unquoted search path vulnerability in PRI Driver software that could allow local authenticated attackers to escalate privileges. Attackers could potentially execute arbitrary code with higher privileges by placing malicious executables in specific directories. This affects users running vulnerable versions of PRI Driver software.

💻 Affected Systems

Products:
  • PRI Driver software
Versions: Versions before 03.03.1002
Operating Systems: Windows (based on Ring 3 user applications context)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access and specific attack conditions to be present.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation to SYSTEM/root level, allowing attackers to install malware, steal credentials, or maintain persistence.

🟠

Likely Case

Local authenticated user gains elevated privileges to install unauthorized software, modify system configurations, or access restricted data.

🟢

If Mitigated

Limited impact due to proper access controls, user awareness, and restricted local access to vulnerable systems.

🌐 Internet-Facing: LOW - Requires local access and authenticated user interaction, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires authenticated local access, but insider threats or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires authenticated user, local access, and specific conditions. Attack complexity is described as high in the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 03.03.1002 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01394.html

Restart Required: Yes

Instructions:

1. Visit Intel Security Advisory INTEL-SA-01394. 2. Download PRI Driver version 03.03.1002 or later. 3. Install the update following vendor instructions. 4. Restart the system as required.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and remote desktop access to systems running vulnerable PRI Driver software

Implement application whitelisting

windows

Use application control solutions to prevent execution of unauthorized binaries

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into affected systems
  • Monitor for suspicious privilege escalation attempts and file creation in system directories

🔍 How to Verify

Check if Vulnerable:

Check PRI Driver version in device manager or using vendor-specific tools. Versions before 03.03.1002 are vulnerable.

Check Version:

wmic path win32_pnpsigneddriver get devicename, driverversion | findstr /i "PRI"

Verify Fix Applied:

Verify installed PRI Driver version is 03.03.1002 or later through device manager or vendor verification tools.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from system directories
  • Privilege escalation events in Windows security logs
  • Driver installation/modification events

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND (NewProcessName contains "system32" OR NewProcessName contains "program files") AND SubjectUserName NOT IN [authorized_admin_users]

🔗 References

📤 Share & Export