CVE-2025-35972

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel MPI Library allows local attackers to escalate privileges by exploiting an uncontrolled search path (DLL hijacking). It affects users running vulnerable versions of Intel MPI Library on Windows systems where an attacker can place malicious files in search paths.

💻 Affected Systems

Products:
  • Intel MPI Library
Versions: All versions before 2021.16
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel MPI Library installed and attacker ability to place files in search paths. Linux systems not affected based on CWE-427 description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to SYSTEM/root level, allowing complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Limited privilege escalation within user context to gain additional permissions or access restricted resources.

🟢

If Mitigated

No impact if proper access controls prevent local file placement or if vulnerable software isn't installed.

🌐 Internet-Facing: LOW - Requires local access and user interaction, not directly exploitable remotely.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit, but requires specific conditions and user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires authenticated user, local access, user interaction, and specific file placement conditions. High complexity attack according to description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.16 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01386.html

Restart Required: Yes

Instructions:

1. Download Intel MPI Library version 2021.16 or later from Intel's website. 2. Uninstall previous vulnerable version. 3. Install updated version. 4. Restart system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies or application controls to restrict DLL loading from untrusted directories

Use Windows AppLocker or Software Restriction Policies to block DLL execution from user-writable directories

Remove vulnerable software

windows

Uninstall Intel MPI Library if not required

Control Panel > Programs > Uninstall Intel MPI Library

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent users from writing to application directories
  • Monitor for suspicious DLL loading events and file creation in application paths

🔍 How to Verify

Check if Vulnerable:

Check Intel MPI Library version: Open Intel MPI Library installation directory and check version in properties or documentation

Check Version:

Check program files\Intel\MPI directory for version information or run 'mpiexec --version' if configured

Verify Fix Applied:

Verify installed version is 2021.16 or later and test MPI functionality works correctly

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Process creation from unusual locations, DLL loading from user directories
  • Security logs: Unauthorized file creation in program directories

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Process creation where parent process is Intel MPI executable and image path contains user directories

🔗 References

📤 Share & Export