CVE-2020-8702

7.3 HIGH

📋 TL;DR

This vulnerability in Intel Processor Diagnostic Tool allows authenticated local users to escalate privileges by exploiting an uncontrolled search path element. Attackers can place malicious DLLs in directories searched by the tool to execute arbitrary code with elevated privileges. Only users with local access to systems running the vulnerable software are affected.

💻 Affected Systems

Products:
  • Intel Processor Diagnostic Tool
Versions: All versions before 4.1.5.37
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to plant malicious DLLs in search paths used by the tool.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install additional tools, or access restricted system resources.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized local access and DLL planting in search paths.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this for privilege escalation on workstations/servers with the tool installed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and ability to place files in specific directories. No public exploit code available at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.5.37

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00458.html

Restart Required: No

Instructions:

1. Download Intel Processor Diagnostic Tool version 4.1.5.37 or later from Intel's website. 2. Uninstall previous versions. 3. Install the updated version. 4. Verify installation by checking version number.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Intel Processor Diagnostic Tool if not required for operations

Control Panel > Programs > Uninstall a program > Select Intel Processor Diagnostic Tool > Uninstall

Restrict DLL search paths

all

Use application control policies to restrict DLL loading from untrusted directories

🧯 If You Can't Patch

  • Remove Intel Processor Diagnostic Tool from all systems where it's not essential
  • Implement strict access controls to prevent unauthorized local users from planting files in application directories

🔍 How to Verify

Check if Vulnerable:

Check installed version of Intel Processor Diagnostic Tool via Control Panel (Windows) or package manager (Linux)

Check Version:

Windows: Check in Control Panel > Programs. Linux: dpkg -l | grep intel-processor-diagnostic-tool or rpm -qa | grep intel-processor-diagnostic-tool

Verify Fix Applied:

Confirm version is 4.1.5.37 or later and verify no older versions exist on system

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Intel Processor Diagnostic Tool directories
  • DLL loading from unexpected locations by IPDT processes

Network Indicators:

  • Not network exploitable - local privilege escalation only

SIEM Query:

Process creation where parent process contains 'IPDT' or 'Intel Processor Diagnostic' AND child process is suspicious (e.g., cmd.exe, powershell.exe, wmic.exe)

🔗 References

📤 Share & Export