CVE-2021-0084

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local users to escalate privileges on Linux systems using Intel Ethernet Controllers X722 and 800 series with vulnerable RDMA drivers. Attackers can exploit improper input validation to gain elevated system access. Only affects systems with these specific Intel network controllers and the vulnerable driver.

💻 Affected Systems

Products:
  • Intel Ethernet Controllers X722 series
  • Intel Ethernet Controllers 800 series
Versions: Linux RDMA driver versions before 1.3.19
Operating Systems: Linux distributions using the Intel RDMA driver
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with these specific Intel Ethernet controllers and the RDMA driver loaded. Requires authenticated local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Privileged user or compromised account escalates to root to install malware, steal credentials, or maintain persistence.

🟢

If Mitigated

With proper access controls and patching, impact limited to denial of service or system instability.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local privilege escalation vulnerabilities are highly valuable for attackers who gain initial foothold.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of driver interaction. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.19 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html

Restart Required: Yes

Instructions:

1. Update Linux kernel RDMA driver to version 1.3.19 or later. 2. Update via distribution package manager (yum update, apt upgrade). 3. Reboot system to load new driver.

🔧 Temporary Workarounds

Disable RDMA functionality

linux

Remove or blacklist the vulnerable RDMA driver module

modprobe -r ib_core
echo 'blacklist ib_core' >> /etc/modprobe.d/blacklist.conf

Restrict local user access

all

Implement strict access controls to limit who can log in locally

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all local user accounts
  • Monitor for suspicious privilege escalation attempts and driver manipulation

🔍 How to Verify

Check if Vulnerable:

Check RDMA driver version: modinfo ib_core | grep version

Check Version:

modinfo ib_core | grep version

Verify Fix Applied:

Verify driver version is 1.3.19 or later: modinfo ib_core | grep version

📡 Detection & Monitoring

Log Indicators:

  • Failed privilege escalation attempts
  • Suspicious driver module loading/unloading
  • Unexpected root access from non-admin users

Network Indicators:

  • Unusual outbound connections following local privilege escalation

SIEM Query:

source="kernel" AND "privilege escalation" OR "ib_core" AND "failed"

🔗 References

📤 Share & Export