Potential security vulnerabilities in some Intel® QuickAssist Technology (QAT) software may allow information disclsoure or escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2023-28741
Description: Buffer overflow in some Intel® QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.9 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
CVEID: CVE-2023-28378
Description: Improper authorization in some Intel® QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVEID: CVE-2023-28740
Description: Uncontrolled search path element in some Intel® QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2023-22313
Description: Improper buffer restrictions in some Intel® QAT Library software before version 22.07.1 may allow a privileged user to potentially enable information disclosure via local access.
CVSS Base Score: 2.3 Low
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Intel® QAT Library (QATlib) before version 22.07.1.
Intel® QAT driver for Windows - HW Version 1.0 before version 1.10.
Intel® QAT driver for Windows - HW Version 2.0 before version 2.04.
Intel recommends updating Intel® QAT Software to the latest versions.
Updates are available for download at these locations:
Intel would like to thank Aobo Wang of Chaitin Security Research Lab (CVE-2023-28741), Mohammed (CVE-2023-28740) and Marius Gabriel Mihai (CVE-2023-28378) for reporting these issues.
The following issue was found internally by Intel, CVE-2023-22313. Intel would like to thank Greg Thomas.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.