Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14612: CWE-377: Insecure Temporary File in Altera Quartus Prime Pro

0
Medium
VulnerabilityCVE-2025-14612cvecve-2025-14612cwe-377
Published: Tue Jan 06 2026 (01/06/2026, 21:24:33 UTC)
Source: CVE Database V5
Vendor/Project: Altera
Product: Quartus Prime Pro

Description

Insecure Temporary File vulnerability in Altera Quartus Prime Pro  Installer (SFX) on Windows allows : Use of Predictable File Names.This issue affects Quartus Prime Pro: from 24.1 through 25.1.1.

AI-Powered Analysis

AILast updated: 01/06/2026, 21:56:00 UTC

Technical Analysis

CVE-2025-14612 is classified under CWE-377, which pertains to insecure temporary file handling. The vulnerability exists in the Altera Quartus Prime Pro installer (SFX) on Windows platforms, specifically affecting versions from 24.1 through 25.1.1. The core issue is the use of predictable file names for temporary files during installation. Predictable temporary file names can be exploited by attackers to perform race conditions or symlink attacks, potentially allowing them to overwrite or read sensitive files. This can lead to unauthorized disclosure of installation data or corruption of files, impacting the integrity and confidentiality of the installation process. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), high attack complexity (AC:H), privileges (PR:L), and user interaction (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level, but the scope is limited to the local system where the installer runs. No known exploits have been reported, and no patches are currently linked, suggesting that mitigation may rely on vendor updates and best practices. The vulnerability is significant for environments where Quartus Prime Pro is used for FPGA design, especially in sensitive or regulated sectors.

Potential Impact

For European organizations, the impact of CVE-2025-14612 depends on the deployment of Altera Quartus Prime Pro within their development and operational environments. Organizations involved in semiconductor design, embedded systems, and critical infrastructure may face risks of unauthorized access or tampering during software installation. The vulnerability could lead to leakage of proprietary design information or compromise of installation integrity, potentially affecting product security and intellectual property. While the attack requires local access and user interaction, insider threats or compromised endpoints could exploit this vulnerability. This risk is particularly relevant for defense contractors, aerospace companies, and advanced manufacturing sectors prevalent in Europe. The medium severity rating suggests a moderate risk, but the potential for escalation or combined attacks could increase impact. Disruption or compromise of FPGA design tools could delay development cycles and introduce vulnerabilities into hardware products, affecting supply chains and operational security.

Mitigation Recommendations

1. Monitor Altera's official channels for patches addressing CVE-2025-14612 and apply them promptly once available. 2. Restrict permissions on temporary directories used during installation to prevent unauthorized file creation or modification by unprivileged users. 3. Use application whitelisting and endpoint protection to limit execution of unauthorized installers or scripts. 4. Conduct installations in controlled environments with minimal user interaction and limited local user privileges. 5. Employ file integrity monitoring on temporary directories to detect suspicious file creation or modification during installation. 6. Educate users and administrators about the risks of running installers with predictable temporary file names and the importance of verifying installer sources. 7. Consider isolating FPGA design environments from general user workstations to reduce exposure. 8. Implement robust logging and audit trails for installation activities to facilitate incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Altera
Date Reserved
2025-12-12T20:34:39.402Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d818706d60d7483a4bf7e

Added to database: 1/6/2026, 9:41:27 PM

Last enriched: 1/6/2026, 9:56:00 PM

Last updated: 1/8/2026, 10:07:06 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats