CVE-2020-0514

7.8 HIGH

📋 TL;DR

This vulnerability in Intel Graphics Driver installers allows authenticated local users to escalate privileges due to improper default permissions. Attackers could gain SYSTEM/root-level access on affected systems. This affects Windows systems with vulnerable Intel Graphics Drivers installed.

💻 Affected Systems

Products:
  • Intel Graphics Drivers
Versions: Versions before 26.20.100.7463 and 15.45.30.5103
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel Graphics Drivers are installed. Requires local authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Malicious insider or compromised user account escalates to administrative privileges to install malware, steal credentials, or bypass security controls.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to denial of service at most.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local privilege escalation vulnerabilities are highly valuable for attackers who gain initial access through phishing, malware, or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The installer permission misconfiguration makes exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.20.100.7463 or 15.45.30.5103 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html

Restart Required: Yes

Instructions:

1. Download updated Intel Graphics Driver from Intel's website or Windows Update. 2. Run the installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict installer directory permissions

windows

Manually set proper permissions on Intel Graphics Driver installation directories to prevent unauthorized access

icacls "C:\Program Files\Intel\Graphics" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)C"

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure no users have unnecessary local administrative rights
  • Monitor for suspicious process creation events and privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Intel Graphics Driver version in Device Manager > Display adapters > Intel Graphics > Driver tab, or run: wmic path win32_pnpsigneddriver where "DeviceName like '%Intel%Graphics%'" get DriverVersion

Check Version:

wmic path win32_pnpsigneddriver where "DeviceName like '%Intel%Graphics%'" get DriverVersion

Verify Fix Applied:

Verify driver version is 26.20.100.7463 or higher (or 15.45.30.5103 for older series) using same commands

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing unusual processes running from Intel Graphics directories with elevated privileges
  • Unexpected SYSTEM-level process execution by non-admin users

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

EventID=4688 AND (NewProcessName contains "Intel" OR NewProcessName contains "Graphics") AND IntegrityLevel="System" AND SubjectUserName!="SYSTEM"

🔗 References

📤 Share & Export