CVE-2021-0077

7.8 HIGH

📋 TL;DR

This vulnerability in Intel VTune Profiler installer allows authenticated local users to escalate privileges due to insecure inherited permissions. It affects users running VTune Profiler versions before 2021.1.1 on Windows systems where the installer creates directories with overly permissive access controls.

💻 Affected Systems

Products:
  • Intel VTune Profiler
Versions: All versions before 2021.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. The vulnerability is in the installer's directory permission inheritance mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/Administrator privileges on the affected system, potentially taking full control of the machine.

🟠

Likely Case

Local authenticated users could elevate their privileges to install malicious software, modify system configurations, or access sensitive data they shouldn't have access to.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to users who already have some level of local access.

🌐 Internet-Facing: LOW - This requires local authenticated access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - While it requires local access, internal users with standard accounts could potentially exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the insecure directory permissions. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.1.1 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00518.html

Restart Required: No

Instructions:

1. Download VTune Profiler version 2021.1.1 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the patched version. 4. Verify the installation directory permissions are properly set.

🔧 Temporary Workarounds

Manual Permission Fix

windows

Manually adjust directory permissions to remove insecure inheritance and restrict access

icacls "C:\Program Files\Intel\VTune Profiler" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts
  • Monitor for unauthorized privilege escalation attempts using Windows security logs

🔍 How to Verify

Check if Vulnerable:

Check VTune Profiler version and verify if directory permissions allow write access to non-admin users

Check Version:

Check VTune Profiler About dialog or run: "C:\Program Files\Intel\VTune Profiler\bin64\vtune.exe" --version

Verify Fix Applied:

Verify VTune Profiler version is 2021.1.1 or later and check that directory permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4672 (Special privileges assigned to new logon)
  • Event ID 4688 (Process creation) showing privilege escalation

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

source="WinEventLog:Security" (EventID=4672 OR EventID=4688) AND (ProcessName="*vtune*" OR CommandLine="*vtune*")

🔗 References

📤 Share & Export