CVE-2021-0133

8.1 HIGH

📋 TL;DR

This vulnerability in Intel Security Library allows authenticated users to perform key exchanges without proper entity authentication, potentially enabling privilege escalation through network access. It affects systems running Intel Security Library versions before 3.3 that use the vulnerable key exchange functionality.

💻 Affected Systems

Products:
  • Intel Security Library
Versions: All versions before 3.3
Operating Systems: All operating systems running Intel Security Library
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the vulnerable key exchange functionality of Intel Security Library.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could escalate privileges to gain administrative control over affected systems, potentially compromising the entire system and accessing sensitive data.

🟠

Likely Case

Authenticated users could gain elevated privileges beyond their intended access level, allowing unauthorized access to protected resources or system functions.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the affected network segment and authenticated users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and network connectivity to the vulnerable system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html

Restart Required: Yes

Instructions:

1. Download Intel Security Library version 3.3 or later from Intel's official website. 2. Stop all services using the library. 3. Install the updated version. 4. Restart affected services and systems.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate systems running vulnerable Intel Security Library versions from untrusted networks

Access Control Restrictions

all

Limit authenticated user access to systems running vulnerable versions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Apply principle of least privilege to limit authenticated user access

🔍 How to Verify

Check if Vulnerable:

Check Intel Security Library version using system package manager or by examining installed software

Check Version:

On Linux: rpm -qa | grep -i intel-security-library or dpkg -l | grep -i intel-security-library

Verify Fix Applied:

Verify Intel Security Library version is 3.3 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected privilege escalation events
  • Abnormal key exchange activity

Network Indicators:

  • Suspicious network traffic to/from systems running Intel Security Library
  • Unexpected key exchange patterns

SIEM Query:

source="intel_security_library" AND (event_type="key_exchange" OR event_type="authentication")

🔗 References

📤 Share & Export