CVE-2021-0151

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated Windows users to escalate privileges through improper access control in Intel Bluetooth installer components. It affects systems running specific Intel Wireless Bluetooth and Killer Bluetooth products on Windows 10.

💻 Affected Systems

Products:
  • Intel Wireless Bluetooth products
  • Intel Killer Bluetooth products
Versions: Specific driver versions prior to Intel's security update (exact versions in Intel advisory)
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Bluetooth hardware and affected driver versions. Vulnerability is in the installer component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local authenticated users exploit the vulnerability to gain elevated privileges for installing malicious software, bypassing security controls, or accessing restricted resources.

🟢

If Mitigated

With proper user access controls and least privilege principles, impact is limited to authorized users who already have some system access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Significant risk from insider threats or compromised user accounts within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. The vulnerability is in access control mechanisms during installation processes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated drivers released by Intel (check specific version in Intel advisory)

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html

Restart Required: Yes

Instructions:

1. Visit Intel's security advisory page. 2. Download updated Bluetooth drivers for your specific hardware. 3. Install the updated drivers. 4. Restart the system.

🔧 Temporary Workarounds

Remove vulnerable Bluetooth drivers

windows

Uninstall affected Intel Bluetooth drivers to eliminate the vulnerable component

Control Panel > Programs and Features > Uninstall Intel Bluetooth drivers

Restrict installer permissions

windows

Apply stricter access controls to installer directories and processes

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users don't have local admin rights
  • Monitor for privilege escalation attempts and unusual installer activity

🔍 How to Verify

Check if Vulnerable:

Check Device Manager > Bluetooth > Intel device properties for driver version and compare with Intel's advisory

Check Version:

wmic path Win32_PnPSignedDriver where "DeviceName like '%Intel%Bluetooth%'" get DeviceName, DriverVersion

Verify Fix Applied:

Verify installed Bluetooth driver version matches or exceeds the patched version listed in Intel advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual installer processes running with elevated privileges
  • Bluetooth driver installation events from non-admin users
  • Security log events showing privilege escalation

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND (ProcessName contains 'setup.exe' OR ProcessName contains 'installer') AND SubjectUserName NOT IN (admin_users_list) AND NewProcessName contains 'system'

🔗 References

📤 Share & Export