CVE-2019-11111

7.8 HIGH

📋 TL;DR

This vulnerability involves pointer corruption in Intel Graphics Drivers' Unified Shader Compiler, allowing authenticated local users to potentially escalate privileges. It affects systems with Intel Graphics Drivers before version 10.18.14.5074 (15.36.x.5074).

💻 Affected Systems

Products:
  • Intel Graphics Drivers
Versions: Versions before 10.18.14.5074 (15.36.x.5074)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel integrated graphics or Intel discrete graphics cards using vulnerable driver versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local authenticated user escalates to higher privileges, potentially installing malware, accessing sensitive data, or bypassing security controls.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service or application crashes.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local authenticated users can exploit this for privilege escalation on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of driver internals. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.18.14.5074 (15.36.x.5074) or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html

Restart Required: Yes

Instructions:

1. Download latest Intel Graphics Driver from Intel website. 2. Run installer. 3. Restart system. 4. Verify driver version is 10.18.14.5074 or higher.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local authenticated user accounts to only trusted personnel.

Disable Intel Graphics if possible

all

Use alternative graphics solution if system supports it.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for local users
  • Monitor for unusual privilege escalation attempts and driver crashes

🔍 How to Verify

Check if Vulnerable:

Check Intel Graphics Driver version in Device Manager (Windows) or via 'lspci -k' and driver info (Linux).

Check Version:

Windows: dxdiag or Device Manager; Linux: glxinfo | grep 'OpenGL version string' or check /sys/class/drm/card*/device/uevent

Verify Fix Applied:

Confirm driver version is 10.18.14.5074 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected driver crashes
  • Privilege escalation events in security logs
  • Unusual process creation with elevated privileges

Network Indicators:

  • None - local exploit only

SIEM Query:

EventID=4688 AND NewProcessName contains * AND SubjectLogonId != 0x3e7 AND ParentProcessName contains explorer.exe

🔗 References

📤 Share & Export