CVE-2020-24481
📋 TL;DR
This vulnerability in Intel Quartus Prime software allows authenticated local users to escalate privileges due to insecure inherited permissions. It affects users of Intel Quartus Prime Pro and Standard editions on Windows systems. Attackers could gain higher system privileges than intended.
💻 Affected Systems
- Intel Quartus Prime Pro Edition
- Intel Quartus Prime Standard Edition
📦 What is this software?
Quartus by Intel
Quartus by Intel
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could gain SYSTEM/administrator privileges on the Windows host, enabling complete system compromise, data theft, and persistence.
Likely Case
Local authenticated users could elevate privileges to install malicious software, modify system configurations, or access restricted data.
If Mitigated
With proper access controls and least privilege principles, impact is limited to the specific user account and Quartus installation.
🎯 Exploit Status
Requires local authenticated access. Exploitation likely involves manipulating file permissions or registry keys.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 20.3 and later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00451.html
Restart Required: Yes
Instructions:
1. Download Intel Quartus Prime version 20.3 or later from Intel website. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict user permissions
windowsApply strict access controls to Quartus installation directories and registry keys
icacls "C:\Program Files\Intel\Quartus" /inheritance:r /grant:r "Users:(RX)" /grant:r "Administrators:(F)"
icacls "C:\ProgramData\Intel\Quartus" /inheritance:r /grant:r "Users:(RX)" /grant:r "Administrators:(F)"
Remove unnecessary user access
windowsRemove Quartus access from non-administrative users who don't require it
Remove users from local groups with Quartus access
🧯 If You Can't Patch
- Implement strict least privilege access controls for Quartus directories and registry
- Monitor for privilege escalation attempts and restrict user access to only necessary systems
🔍 How to Verify
Check if Vulnerable:
Check Quartus version via Help > About in application or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Intel\Quartus\Version
Check Version:
reg query "HKLM\SOFTWARE\Intel\Quartus" /v Version
Verify Fix Applied:
Confirm version is 20.3 or later and verify directory permissions are properly restricted
📡 Detection & Monitoring
Log Indicators:
- Windows Security event logs showing privilege escalation attempts
- Access to Quartus directories by non-admin users
- Registry modifications to Quartus keys
Network Indicators:
- No network indicators - local privilege escalation only
SIEM Query:
EventID=4672 AND ProcessName LIKE '%quartus%' OR EventID=4688 AND NewProcessName LIKE '%quartus%' AND SubjectUserName != 'SYSTEM'