Impact
A buffer overflow flaw exists in Intel QAT software drivers for Windows released before version 1.13. The overflow occurs in ring‑3 code and can be triggered by an unprivileged authenticated user providing crafted input, causing the driver to crash and the system to go offline. The flaw has low impact on confidentiality and integrity but a high impact on availability.
Affected Systems
Intel QAT software drivers for Windows, versions earlier than 1.13, which are used to offload cryptographic functions on Windows operating systems.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate level of severity. No EPSS score is available, so the likelihood of exploitation is currently unclear. The vulnerability requires local access by an authenticated user, making it exploitable by malicious software running on the target machine. It is not listed in the CISA KEV catalog, suggesting no widespread exploitation at present. Attackers would need to run or inject malicious code into the system to trigger the crash, potentially without user interaction if the driver is loaded under normal operation.
OpenCVE Enrichment