CVE-2025-32732

6.6 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in Intel QAT Windows software versions before 2.6.0 allows authenticated local users to cause denial of service. Attackers with local access can crash the system without user interaction. This affects Windows systems running vulnerable Intel QuickAssist Technology software.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) Windows software
Versions: All versions before 2.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT software installed. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or freeze requiring hard reboot, potentially disrupting critical services.

🟠

Likely Case

Application or service crash affecting QAT-dependent operations, requiring service restart.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts with local access could disrupt systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Attack requires authenticated local access. No user interaction needed once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01373.html

Restart Required: Yes

Instructions:

1. Download Intel QAT software version 2.6.0 or later from Intel's website. 2. Uninstall previous QAT software. 3. Install the updated version. 4. Reboot the system.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts and implement least privilege access controls

Disable QAT if not required

windows

Uninstall Intel QAT software if cryptographic acceleration is not needed

Control Panel > Programs > Uninstall Intel QAT software

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for abnormal system crashes or QAT service failures

🔍 How to Verify

Check if Vulnerable:

Check Intel QAT software version in Programs and Features or via 'wmic product get name,version'

Check Version:

wmic product where "name like '%Intel%QAT%'" get name,version

Verify Fix Applied:

Confirm installed QAT version is 2.6.0 or later

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Windows Event Logs related to QAT processes
  • System stability issues or unexpected reboots

Network Indicators:

  • None - local exploit only

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName contains 'qat' OR Source contains 'Intel QAT'

🔗 References

📤 Share & Export