CVE-2021-0112

7.3 HIGH

📋 TL;DR

This vulnerability allows an authenticated Windows user to escalate privileges by exploiting an unquoted service path in Intel Unite Client. Attackers could place malicious executables in paths with spaces that Windows searches before the legitimate service executable. Only affects Windows systems running vulnerable Intel Unite Client versions.

💻 Affected Systems

Products:
  • Intel Unite Client for Windows
Versions: All versions before 4.2.25031
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the Windows system. The vulnerability exists in how Windows services with unquoted paths search for executables.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM-level privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement.

🟠

Likely Case

Authenticated user with limited privileges escalates to administrator rights, potentially installing unauthorized software or accessing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of unquoted service path vulnerabilities. Similar techniques are well-documented for Windows privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.25031 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html

Restart Required: Yes

Instructions:

1. Download Intel Unite Client version 4.2.25031 or later from Intel's official site. 2. Run the installer with administrative privileges. 3. Restart the system to ensure service updates take effect.

🔧 Temporary Workarounds

Manually quote service path

windows

Modify the Intel Unite service to use quoted paths in Windows Registry

sc config "Intel Unite Client" binPath="\"C:\Program Files\Intel\Unite Client\unite-service.exe\""

Restrict write permissions

windows

Remove write permissions from directories in the service path that could be exploited

icacls "C:\Program Files\Intel" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to affected systems
  • Monitor for suspicious file creation in directories like C:\Program, C:\Program Files, and C:\Program Files\Intel

🔍 How to Verify

Check if Vulnerable:

Check Intel Unite Client version in Programs and Features or run: sc qc "Intel Unite Client" to see if path is unquoted

Check Version:

wmic product where name="Intel Unite Client" get version

Verify Fix Applied:

Verify version is 4.2.25031 or higher and service path is properly quoted in Windows Registry

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing execution from unexpected paths
  • Security logs showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from systems running Intel Unite Client

SIEM Query:

source="windows_security" EventID=4688 (Image="*Program Files*Intel*" OR Image="*Program*Intel*")

🔗 References

📤 Share & Export