CVE-2021-0091

7.8 HIGH

📋 TL;DR

This vulnerability allows an unauthenticated attacker with local access to improperly access firmware controls in certain Intel processors, potentially enabling privilege escalation. It affects systems running vulnerable Intel processor firmware versions.

💻 Affected Systems

Products:
  • Intel Processors with vulnerable firmware
Versions: Specific firmware versions as listed in Intel advisory
Operating Systems: All operating systems running on affected processors
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical or remote local access to the system. Virtual machines may also be affected if running on vulnerable hardware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full system control by escalating privileges from a low-privileged user to kernel or firmware-level access.

🟠

Likely Case

Local attackers could bypass security controls to access restricted system resources or data.

🟢

If Mitigated

With proper access controls and firmware updates, the attack surface is significantly reduced.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: HIGH - Local attackers on shared systems or compromised accounts could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires local access and knowledge of firmware interfaces. No public exploits have been documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates provided by Intel and system manufacturers

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html

Restart Required: Yes

Instructions:

1. Check Intel advisory for affected processors. 2. Contact system manufacturer for firmware updates. 3. Apply firmware update following manufacturer instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote local access to systems with vulnerable firmware

Implement Least Privilege

all

Ensure users have minimal necessary privileges to reduce impact of escalation

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and users
  • Implement strict access controls and monitoring for local privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check system BIOS/UEFI firmware version against Intel's advisory list

Check Version:

On Linux: sudo dmidecode -t bios | grep Version; On Windows: wmic bios get smbiosbiosversion

Verify Fix Applied:

Verify firmware version has been updated to patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware access attempts
  • Privilege escalation events
  • BIOS/UEFI configuration changes

Network Indicators:

  • Local network traffic indicating privilege escalation attempts

SIEM Query:

EventID=4672 OR EventID=4688 on Windows systems showing privilege changes

🔗 References

📤 Share & Export