CVE-2021-33062

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local users to escalate privileges due to incorrect default permissions in Intel VTune Profiler installer. It affects users running VTune Profiler versions before 2021.3.0 on systems where the software is installed.

💻 Affected Systems

Products:
  • Intel VTune Profiler
Versions: All versions before 2021.3.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of VTune Profiler. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, potentially leading to complete system compromise, data theft, or installation of persistent malware.

🟠

Likely Case

A local user with standard privileges could elevate to administrative rights, allowing them to modify system configurations, install software, or access restricted data.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to users who already have some level of local access to the system.

🌐 Internet-Facing: LOW - This requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires authenticated access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the vulnerable permissions configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.3.0 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html

Restart Required: Yes

Instructions:

1. Download VTune Profiler 2021.3.0 or later from Intel's website. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Manual Permission Correction

all

Manually adjust file and directory permissions to remove excessive write access for non-admin users

Review and correct permissions on VTune Profiler installation directories using appropriate OS permission tools

Remove Unused Installations

all

Uninstall VTune Profiler if not actively needed

Use system uninstaller or package manager to remove VTune Profiler

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems with VTune Profiler installed
  • Apply principle of least privilege and monitor for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check VTune Profiler version: On Windows check Programs and Features, on Linux check package manager or run 'vtune --version'

Check Version:

vtune --version (if in PATH) or check installation directory properties

Verify Fix Applied:

Verify installed version is 2021.3.0 or later and check that file permissions in installation directory are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Access to VTune Profiler installation directories by non-admin users
  • Installation of new VTune Profiler versions

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

Search for: 'privilege escalation' AND 'VTune' OR 'process creation' with parent process related to VTune installation

🔗 References

📤 Share & Export