CVE-2019-0155

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated user to potentially escalate privileges via local access due to insufficient access control in Intel processor graphics subsystems. It affects multiple Intel processor families and graphics drivers across Windows and Linux systems. Exploitation could lead to unauthorized system control.

💻 Affected Systems

Products:
  • Intel Core Processors (6th-9th Gen)
  • Intel Pentium Processors (J, N, Silver, Gold Series)
  • Intel Celeron Processors (J, N, G3900, G4900 Series)
  • Intel Atom Processors (A, E3900 Series)
  • Intel Xeon Processors (E3-1500 v5/v6, E-2100, E-2200)
  • Intel Graphics Driver for Windows
  • i915 Linux Driver for Intel Processor Graphics
Versions: Windows drivers before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077; Linux drivers before 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel integrated graphics using vulnerable driver versions. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local authenticated user escalates privileges to gain unauthorized access to sensitive system resources or other user accounts.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service or minimal privilege escalation.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable over network.
🏢 Internal Only: HIGH - Local authenticated users (including compromised accounts) can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of the vulnerability. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Windows: 26.20.100.6813 (DCH) or 26.20.100.6812 and 21.20.x.5077 or later; Linux: 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 or later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2019:3841

Restart Required: Yes

Instructions:

1. Identify affected systems using version_check_command. 2. Download updated drivers from Intel or OS vendor. 3. Install updated graphics drivers. 4. Reboot system to apply changes. 5. Verify installation with verification commands.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit local user accounts and implement least privilege principles to reduce attack surface.

Disable Intel Graphics if Not Needed

all

If system has dedicated graphics and doesn't require Intel integrated graphics, disable it in BIOS/UEFI.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Segment affected systems and limit lateral movement capabilities

🔍 How to Verify

Check if Vulnerable:

Check graphics driver version against affected versions. On Linux: check kernel version with 'uname -r'. On Windows: check driver version in Device Manager under Display adapters.

Check Version:

Linux: 'uname -r'; Windows: 'wmic path win32_pnpentity get caption,driverVersion' or check Device Manager

Verify Fix Applied:

Confirm driver/kernel version is updated to patched versions. Test privilege escalation attempts should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Failed authorization attempts on graphics subsystem
  • Driver loading/unloading anomalies

Network Indicators:

  • None - local exploit only

SIEM Query:

Search for events related to graphics driver access, privilege changes, or unauthorized system calls from non-admin users.

🔗 References

📤 Share & Export