VYPR
Low severity3.3NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-31948

CVE-2025-31948

Description

Improper input validation for some Intel(R) oneAPI Math Kernel Library before version 2025.2 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Input validation flaw in Intel(R) oneAPI Math Kernel Library before 2025.2 allows local denial of service via low-complexity authenticated attack.

Vulnerability

Overview

CVE-2025-31948 is an improper input validation vulnerability in some versions of Intel(R) oneAPI Math Kernel Library. The library fails to properly validate certain input data, leading to a potential denial of service condition when exploited by an authenticated user through local access [1].

Exploitation

Details

An unprivileged software adversary with an authenticated user account can exploit this vulnerability without requiring special internal knowledge or user interaction. The attack is considered low complexity and occurs from Ring 3 (User Applications) via local access. No special privileges beyond standard authentication are needed, making the barrier to entry low [1].

Impact

Assessment

Successful exploitation results in a successful exploitation could cause a denial of service, impacting availability with a low severity rating (CVSS v3 base score 3.3). The vulnerability does not affect confidentiality or integrity. The subsequent system impact on availability is also listed as none, indicating the DoS is limited in scope [1].

Mitigation

Status

Intel has addressed this vulnerability in version 2025.2 and later of the oneAPI Math Kernel Library. Users are advised to update to the latest version to mitigate the risk [1].

References
  1. INTEL-SA-01366

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.