Description
Improper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Published: 2026-05-12
Score: 8.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The bug is an improper input validation flaw in Intel(R) QAT software drivers for Windows before version 1.13 that allows an attacker to elevate privileges. An unprivileged user application can exploit the flaw within ring 3, potentially gaining higher system privileges. The vulnerability can compromise confidentiality, integrity, and availability at high levels, leading to full loss of those values once exploited.

Affected Systems

This issue affects Intel QAT software drivers for Windows with versions older than 1.13. It applies to all installations using those drivers where the software runs with user‑space privileges and no special internal knowledge is required.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity level, and the EPSS score is not available, so the current likelihood of exploitation is unknown. The vulnerability is not listed in the CISA KEV catalog. Attack requirements are local: an authenticated user with low complexity attacks can trigger the escalation, and no user interaction is needed. Given the high impact and local nature, the risk to affected systems is significant when drivers are not updated.

Generated by OpenCVE AI on May 12, 2026 at 19:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Intel QAT software drivers to version 1.13 or later.
  • If an update cannot be applied immediately, isolate or disable the QAT drivers for non‑trusted applications to limit the attack surface.
  • Enforce strict least‑privilege permissions on all user applications that interact with QAT drivers to mitigate improper input validation risks.

Generated by OpenCVE AI on May 12, 2026 at 19:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Input Validation in Intel QAT Windows Drivers

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-13T03:58:43.491Z

Reserved: 2025-12-04T04:00:32.808Z

Link: CVE-2026-20767

cve-icon Vulnrichment

Updated: 2026-05-13T01:36:35.598Z

cve-icon NVD

Status : Received

Published: 2026-05-12T18:16:37.433

Modified: 2026-05-12T18:16:37.433

Link: CVE-2026-20767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T20:00:13Z

Weaknesses