Impact
A null pointer dereference occurs within the Intel(R) QAT software drivers for Windows when executed in user mode (Ring 3). The flaw allows an attacker with local, authenticated access and no special internal knowledge to trigger a denial of service. The vulnerability does not compromise confidentiality or integrity but results in high availability impact for the vulnerable system.
Affected Systems
Intel QAT Windows drivers prior to version 1.13 on Windows operating systems. The flaw is present in all driver releases before that version and affects any system that loads the QAT driver in a user‑space application.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. EPSS is not published, but the vulnerability requires only local access and authentication, making it plausible for compromise on the system. It is not listed in the CISA KEV catalog, yet the attack path involves a low complexity local attack vector that could be executed without user interaction.
OpenCVE Enrichment