CVE-2021-0055

7.8 HIGH

📋 TL;DR

This vulnerability affects Intel NUC 9 Extreme Laptop Kit LAN drivers with insecure inherited permissions. An authenticated attacker could exploit this to escalate privileges on the local system. Only users of specific Intel hardware with vulnerable driver versions are affected.

💻 Affected Systems

Products:
  • Intel NUC 9 Extreme Laptop Kit
Versions: LAN driver versions before 10.42
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the specific Intel hardware and vulnerable driver combination. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Local authenticated user elevates to administrative privileges, allowing installation of malware, configuration changes, and access to protected resources.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the user's own account scope.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local authenticated access is common in enterprise environments, making internal exploitation feasible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The CWE-732 (Incorrect Permission Assignment) suggests straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LAN driver version 10.42 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html

Restart Required: Yes

Instructions:

1. Download updated driver from Intel Driver & Support Assistant or Intel website. 2. Run installer with administrative privileges. 3. Follow on-screen prompts. 4. Restart system when prompted.

🔧 Temporary Workarounds

Remove vulnerable driver

windows

Uninstall the vulnerable LAN driver and use alternative network connectivity

Control Panel > Programs > Uninstall a program > Select Intel LAN Driver > Uninstall

Restrict local access

all

Implement strict local access controls and least privilege principles

🧯 If You Can't Patch

  • Implement strict local user access controls and limit administrative privileges
  • Monitor for privilege escalation attempts and driver-related system changes

🔍 How to Verify

Check if Vulnerable:

Check Device Manager > Network adapters > Intel Ethernet Connection > Driver tab > Driver version. If version is below 10.42, system is vulnerable.

Check Version:

wmic path win32_pnpsigneddriver where devicename like '%Intel%' get devicename, driverversion

Verify Fix Applied:

Verify driver version is 10.42 or higher in Device Manager after update and restart.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected driver installations
  • Privilege escalation events
  • Driver file permission changes

Network Indicators:

  • Local privilege escalation patterns
  • Driver manipulation attempts

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%driverinstall%' OR CommandLine LIKE '%lan%') AND SubjectUserName NOT IN (admin_users)

🔗 References

📤 Share & Export