CVE-2021-33088

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local users to escalate privileges on Intel NUC M15 Laptop Kit systems due to incorrect default permissions in the Integrated Sensor Hub driver installer. Attackers could gain SYSTEM-level access by exploiting overly permissive file permissions set during installation. Only users with local access to affected systems are at risk.

💻 Affected Systems

Products:
  • Intel NUC M15 Laptop Kit Integrated Sensor Hub driver
Versions: All versions before 5.4.1.4449
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the vulnerable driver pack is installed. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement within the network.

🟠

Likely Case

Malicious local users or malware with user-level access escalate to administrative privileges to install additional malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper access controls, least privilege principles, and network segmentation, impact is limited to the local system with reduced lateral movement potential.

🌐 Internet-Facing: LOW - This requires local authenticated access, not remotely exploitable via internet-facing interfaces.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with local access could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of vulnerable file locations. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.1.4449 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html

Restart Required: Yes

Instructions:

1. Download updated driver from Intel Driver & Support Assistant or Intel website. 2. Uninstall previous driver version. 3. Install version 5.4.1.4449 or newer. 4. Restart system.

🔧 Temporary Workarounds

Remove vulnerable driver

windows

Uninstall the Intel Integrated Sensor Hub driver if not required for functionality

Control Panel > Programs > Uninstall a program > Intel(R) Integrated Sensor Solution

Restrict file permissions

windows

Manually adjust permissions on driver files to remove write access for non-admin users

icacls "C:\Windows\System32\drivers\ish*.sys" /deny Users:(F)

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit local user permissions
  • Monitor for suspicious privilege escalation attempts and file permission changes

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager > System devices > Intel(R) Integrated Sensor Solution > Driver tab

Check Version:

Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*Intel*Integrated*Sensor*'} | Select-Object DeviceName, DriverVersion

Verify Fix Applied:

Verify driver version is 5.4.1.4449 or higher in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) with parent-child privilege escalation
  • Unexpected SYSTEM-level process execution from user contexts
  • File permission changes to driver files

Network Indicators:

  • Unusual outbound connections from previously low-privilege accounts

SIEM Query:

EventID=4688 AND NewProcessName="*\system32\*" AND ParentProcessName="*user*" | stats count by ParentProcessName, NewProcessName

🔗 References

📤 Share & Export