CVE-2019-11111
📋 TL;DR
This vulnerability involves pointer corruption in Intel Graphics Drivers' Unified Shader Compiler, allowing authenticated local users to potentially escalate privileges. It affects systems with Intel Graphics Drivers before version 10.18.14.5074 (15.36.x.5074).
💻 Affected Systems
- Intel Graphics Drivers
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, and persistence.
Likely Case
Local authenticated user escalates to higher privileges, potentially installing malware, accessing sensitive data, or bypassing security controls.
If Mitigated
With proper access controls and patching, impact is limited to denial of service or application crashes.
🎯 Exploit Status
Requires local authenticated access and knowledge of driver internals. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.18.14.5074 (15.36.x.5074) or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html
Restart Required: Yes
Instructions:
1. Download latest Intel Graphics Driver from Intel website. 2. Run installer. 3. Restart system. 4. Verify driver version is 10.18.14.5074 or higher.
🔧 Temporary Workarounds
Restrict local user access
allLimit local authenticated user accounts to only trusted personnel.
Disable Intel Graphics if possible
allUse alternative graphics solution if system supports it.
🧯 If You Can't Patch
- Implement strict least privilege access controls for local users
- Monitor for unusual privilege escalation attempts and driver crashes
🔍 How to Verify
Check if Vulnerable:
Check Intel Graphics Driver version in Device Manager (Windows) or via 'lspci -k' and driver info (Linux).
Check Version:
Windows: dxdiag or Device Manager; Linux: glxinfo | grep 'OpenGL version string' or check /sys/class/drm/card*/device/uevent
Verify Fix Applied:
Confirm driver version is 10.18.14.5074 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected driver crashes
- Privilege escalation events in security logs
- Unusual process creation with elevated privileges
Network Indicators:
- None - local exploit only
SIEM Query:
EventID=4688 AND NewProcessName contains * AND SubjectLogonId != 0x3e7 AND ParentProcessName contains explorer.exe