CVE-2021-0106

7.8 HIGH

📋 TL;DR

This vulnerability in Intel Optane DC Persistent Memory for Windows software allows authenticated local users to escalate privileges due to incorrect default permissions. It affects systems running vulnerable versions of the software, potentially enabling attackers to gain higher system privileges than intended.

💻 Affected Systems

Products:
  • Intel Optane DC Persistent Memory for Windows
Versions: Versions before 2.00.00.3842 or 1.00.00.3515
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel Optane DC Persistent Memory hardware and the vulnerable Windows management software installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM-level privileges, potentially taking full control of the affected system, accessing sensitive data, or installing persistent malware.

🟠

Likely Case

An authenticated user with standard privileges could elevate to administrator or SYSTEM privileges, enabling unauthorized configuration changes or data access.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to authorized users who already have some level of system access.

🌐 Internet-Facing: LOW - This requires local authenticated access, making remote exploitation unlikely without prior system compromise.
🏢 Internal Only: HIGH - Internal users with standard authentication could exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access but leverages default permission misconfigurations, making it relatively straightforward for authenticated attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.00.00.3842 or 1.00.00.3515

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00541.html

Restart Required: Yes

Instructions:

1. Download the updated Intel Optane DC Persistent Memory for Windows software from Intel's website. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local login access to trusted administrators only

Apply Least Privilege

windows

Ensure users only have necessary permissions and cannot execute privileged operations

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can log in locally to affected systems
  • Monitor for privilege escalation attempts and review user privilege assignments regularly

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Intel Optane DC Persistent Memory for Windows software via Programs and Features or using PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Optane*'}

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Optane*'} | Select-Object Name, Version

Verify Fix Applied:

Verify the software version is 2.00.00.3842 or higher (for v2) or 1.00.00.3515 or higher (for v1)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access to Optane management functions
  • Changes to Optane configuration by non-admin users

Network Indicators:

  • Local system activity only - no network indicators

SIEM Query:

EventID=4672 OR EventID=4688 WHERE SubjectUserName NOT IN (admin_users) AND PrivilegeList CONTAINS 'SeDebugPrivilege' OR 'SeTcbPrivilege'

🔗 References

📤 Share & Export