CVE-2021-0055
📋 TL;DR
This vulnerability affects Intel NUC 9 Extreme Laptop Kit LAN drivers with insecure inherited permissions. An authenticated attacker could exploit this to escalate privileges on the local system. Only users of specific Intel hardware with vulnerable driver versions are affected.
💻 Affected Systems
- Intel NUC 9 Extreme Laptop Kit
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.
Likely Case
Local authenticated user elevates to administrative privileges, allowing installation of malware, configuration changes, and access to protected resources.
If Mitigated
With proper access controls and least privilege principles, impact is limited to the user's own account scope.
🎯 Exploit Status
Exploitation requires local authenticated access. The CWE-732 (Incorrect Permission Assignment) suggests straightforward exploitation once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: LAN driver version 10.42 or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html
Restart Required: Yes
Instructions:
1. Download updated driver from Intel Driver & Support Assistant or Intel website. 2. Run installer with administrative privileges. 3. Follow on-screen prompts. 4. Restart system when prompted.
🔧 Temporary Workarounds
Remove vulnerable driver
windowsUninstall the vulnerable LAN driver and use alternative network connectivity
Control Panel > Programs > Uninstall a program > Select Intel LAN Driver > Uninstall
Restrict local access
allImplement strict local access controls and least privilege principles
🧯 If You Can't Patch
- Implement strict local user access controls and limit administrative privileges
- Monitor for privilege escalation attempts and driver-related system changes
🔍 How to Verify
Check if Vulnerable:
Check Device Manager > Network adapters > Intel Ethernet Connection > Driver tab > Driver version. If version is below 10.42, system is vulnerable.
Check Version:
wmic path win32_pnpsigneddriver where devicename like '%Intel%' get devicename, driverversion
Verify Fix Applied:
Verify driver version is 10.42 or higher in Device Manager after update and restart.
📡 Detection & Monitoring
Log Indicators:
- Unexpected driver installations
- Privilege escalation events
- Driver file permission changes
Network Indicators:
- Local privilege escalation patterns
- Driver manipulation attempts
SIEM Query:
EventID=4688 AND (ProcessName LIKE '%driverinstall%' OR CommandLine LIKE '%lan%') AND SubjectUserName NOT IN (admin_users)