Description
Divide by zero for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Published: 2026-05-12
Score: 6.8 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A divide‑by‑zero error in Intel(R) QAT software drivers for Windows, affecting all builds prior to version 1.13, permits an authenticated local attacker to cause an unexpected termination of the driver and interruption of any dependent software. The flaw does not compromise confidentiality or integrity but results in a service interruption that can impact system availability.

Affected Systems

The vulnerability is present in Intel(R) QAT software drivers for Windows running any version earlier than 1.13. No further sub‑version details are enumerated.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity; the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers need local access and an authenticated user account, but no special privileges or additional knowledge are required. The attack can be carried out without user interaction and poses a high impact on availability while causing no impact on confidentiality or integrity.

Generated by OpenCVE AI on May 12, 2026 at 18:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Intel QAT drivers to a version 1.13 or later that contains the fix.
  • If upgrading is not immediately possible, disable the QAT driver or its services on systems that do not require it to limit the attack surface.
  • Apply strict local‑user access controls so that only trusted accounts can use the driver, thereby reducing the likelihood of a successful local denial‑of-service attempt.

Generated by OpenCVE AI on May 12, 2026 at 18:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Intel QAT Driver Divide-by-Zero Denial of Service

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Divide by zero for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Weaknesses CWE-369
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2026-05-12T17:17:23.966Z

Reserved: 2025-12-04T04:00:32.822Z

Link: CVE-2026-20881

cve-icon Vulnrichment

Updated: 2026-05-12T17:17:18.216Z

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:19.487

Modified: 2026-05-12T17:16:19.487

Link: CVE-2026-20881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:30:22Z

Weaknesses