CVE-2025-35998
Intel · Quick Assist Technology (QAT)
A flaw in Intel Quick Assist Technology allows an attacker with Ring 0 access to bypass hardware interface protections, leading to kernel-level privilege escalation.
Executive summary
Intel Quick Assist Technology contains a critical privilege escalation vulnerability that could allow an attacker with kernel-level access to bypass hardware protections and compromise the platform.
Vulnerability
This vulnerability involves a missing protection mechanism for an alternate hardware interface within the Intel Quick Assist Technology. An attacker already operating within Ring 0 (Kernel mode) can exploit this flaw to bypass intended security boundaries, potentially leading to further escalation of privilege across the platform.
Business impact
A successful exploit of this vulnerability could lead to a total compromise of the affected Intel platform. By bypassing hardware-level protections from the kernel, an attacker can gain persistent, unauthorized control over system operations and sensitive data. The CVSS score of 7.9 reflects a High severity, as it undermines the fundamental security architecture of the hardware-software interface.
Remediation
Immediate Action: Administrators should immediately apply the security updates and firmware patches provided by Intel or the respective OEM hardware vendor to mitigate this hardware interface flaw.
Proactive Monitoring: Security teams should monitor for unauthorized kernel-mode drivers or suspicious Ring 0 activities that may indicate an attempt to interact with hardware interfaces.
Compensating Controls: Ensure that the principle of least privilege is strictly enforced to prevent unauthorized users or processes from gaining the initial Ring 0 access required to trigger this vulnerability.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant risk to platform integrity by allowing an attacker to circumvent hardware protections. It is imperative that organizations prioritize the deployment of Intel's firmware and driver updates. Failure to patch may leave systems vulnerable to advanced persistent threats capable of achieving deep system persistence.