Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31937: Denial of Service in Intel(R) QAT Windows software

0
Medium
VulnerabilityCVE-2025-31937cvecve-2025-31937
Published: Tue Nov 11 2025 (11/11/2025, 16:50:49 UTC)
Source: CVE Database V5
Product: Intel(R) QAT Windows software

Description

Out-of-bounds read for some Intel(R) QAT Windows software before version 2.6.0. within Ring 3: User Applications may allow a denial of service. System software adversary with an authenticated user combined with a high complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:48:07 UTC

Technical Analysis

CVE-2025-31937 is a vulnerability identified in Intel(R) QuickAssist Technology (QAT) Windows software prior to version 2.6.0. The issue is an out-of-bounds read occurring within Ring 3, which is the user application layer, potentially allowing a denial of service (DoS) condition. The vulnerability requires an authenticated local user with system software privileges to exploit, combined with a high complexity attack, meaning it is not trivial to execute. No user interaction is needed, and no special internal knowledge is required beyond authentication. The flaw does not affect confidentiality or integrity but can severely impact system availability by causing crashes or resource exhaustion. The CVSS 4.0 score is 5.7 (medium), reflecting the local attack vector, high complexity, and the requirement for low privileges but no user interaction. The vulnerability is specific to Intel QAT Windows software, which is used to accelerate cryptographic and compression workloads, often in enterprise and data center environments. No public exploits or active exploitation have been reported, but the vulnerability could be leveraged to disrupt services relying on Intel QAT hardware acceleration.

Potential Impact

For European organizations, the primary impact is on availability of systems utilizing Intel QAT Windows software for cryptographic acceleration. Disruption could affect critical infrastructure, financial services, telecommunications, and cloud providers that rely on Intel QAT for performance improvements. Although confidentiality and integrity are not compromised, denial of service could lead to downtime, degraded service quality, and potential operational disruptions. Organizations with high dependency on Intel QAT hardware acceleration may experience service interruptions, impacting business continuity and customer trust. The requirement for local authenticated access limits remote exploitation risk but insider threats or compromised accounts could leverage this vulnerability. The absence of known exploits reduces immediate risk but patching remains critical to prevent future attacks.

Mitigation Recommendations

Organizations should promptly upgrade Intel QAT Windows software to version 2.6.0 or later where this vulnerability is addressed. Implement strict access controls and monitoring to limit local authenticated user privileges, reducing the risk of exploitation. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Regularly audit user accounts and restrict administrative privileges to minimize insider threat risks. Network segmentation can isolate critical systems using Intel QAT hardware to contain potential DoS impacts. Additionally, maintain up-to-date backups and incident response plans to quickly recover from any service disruptions. Since no patches links were provided, organizations should monitor Intel’s official advisories for updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:12:29.278Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b7212d2ca32afccdb7a

Added to database: 11/11/2025, 4:59:30 PM

Last enriched: 11/18/2025, 5:48:07 PM

Last updated: 11/22/2025, 12:45:06 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats