Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14612: CWE-377: Insecure Temporary File in Altera Quartus Prime Pro

0
Medium
VulnerabilityCVE-2025-14612cvecve-2025-14612cwe-377
Published: Tue Jan 06 2026 (01/06/2026, 21:24:33 UTC)
Source: CVE Database V5
Vendor/Project: Altera
Product: Quartus Prime Pro

Description

Insecure Temporary File vulnerability in Altera Quartus Prime Pro  Installer (SFX) on Windows allows : Use of Predictable File Names.This issue affects Quartus Prime Pro: from 24.1 through 25.1.1.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:37:18 UTC

Technical Analysis

CVE-2025-14612 identifies a security vulnerability classified under CWE-377 (Insecure Temporary File) in the Altera Quartus Prime Pro software installer for Windows platforms. The vulnerability stems from the use of predictable file names for temporary files during the installation process, which can be exploited by local attackers with limited privileges. Specifically, the installer creates temporary files with names that can be anticipated by an attacker, allowing them to perform race conditions or symbolic link (symlink) attacks to replace or manipulate these files. This can lead to unauthorized access, modification, or disclosure of sensitive installation data or potentially escalate privileges if the installer runs with elevated rights. The affected versions include Quartus Prime Pro from 24.1 through 25.1.1. The CVSS 4.0 base score is 5.4 (medium severity), reflecting that exploitation requires local access, user interaction, and privileges but can impact confidentiality, integrity, and availability to a high degree. No public exploits are known at this time, and no patches have been released yet. The vulnerability is particularly relevant in environments where multiple users share systems or where attackers have limited local access but can trick users into running the installer. The insecure temporary file handling is a common vector for privilege escalation or data tampering attacks, emphasizing the need for secure file handling practices in software installers.

Potential Impact

For European organizations, especially those involved in semiconductor design, embedded systems, and electronics manufacturing, this vulnerability poses a moderate risk. Exploitation could allow local attackers to manipulate installation files, potentially leading to compromised FPGA development environments or unauthorized code injection. This could affect the integrity of hardware design processes and intellectual property. Confidentiality may be impacted if sensitive installation data or configuration files are exposed or altered. Availability could also be affected if the installation process is disrupted or corrupted. The requirement for local access and user interaction limits the scope but does not eliminate risk in shared or multi-user environments, such as university labs, research centers, or collaborative engineering teams common in Europe. The lack of known exploits reduces immediate threat but organizations should proactively address the vulnerability to prevent future exploitation.

Mitigation Recommendations

1. Monitor Altera's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2. Restrict local user permissions to prevent unauthorized users from accessing or modifying installation directories and temporary file locations. 3. Use application whitelisting and endpoint protection solutions to monitor and control installer execution and temporary file creation. 4. Educate users to avoid running installers from untrusted sources or without proper verification. 5. Implement secure temporary file handling policies, such as using randomized file names and secure directories with appropriate access controls, if customizing installation processes. 6. In multi-user environments, isolate user sessions and restrict shared access to temporary directories to reduce the risk of race conditions or symlink attacks. 7. Conduct regular audits of file system permissions and temporary file usage on systems running Quartus Prime Pro.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Altera
Date Reserved
2025-12-12T20:34:39.402Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d818706d60d7483a4bf7e

Added to database: 1/6/2026, 9:41:27 PM

Last enriched: 1/14/2026, 1:37:18 AM

Last updated: 2/7/2026, 6:54:14 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats