CVE-2021-33090

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local users to escalate privileges on affected Intel NUC systems due to incorrect default permissions in the HDMI firmware update tool installer. It affects users of specific Intel NUC models (NUC10i3FN, NUC10i5FN, NUC10i7FN) who have not updated to the patched version. Attackers with local access could gain elevated system privileges.

💻 Affected Systems

Products:
  • Intel NUC HDMI Firmware Update Tool
Versions: All versions before 1.78.2.0.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects Intel NUC models NUC10i3FN, NUC10i5FN, and NUC10i7FN. The vulnerability is in the installer permissions, not the tool itself once installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full SYSTEM/root privileges on the affected NUC device, enabling complete system compromise, data theft, persistence installation, and lateral movement within the network.

🟠

Likely Case

A malicious insider or compromised user account escalates privileges to install malware, steal sensitive data, or maintain persistence on the affected NUC system.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to the specific user's scope, though local privilege escalation remains possible if the vulnerability is exploited.

🌐 Internet-Facing: LOW - This requires local authenticated access, so internet-facing systems are not directly vulnerable unless an attacker first gains local access through other means.
🏢 Internal Only: HIGH - This is a local privilege escalation vulnerability that can be exploited by any authenticated user on affected systems, making internal networks with vulnerable NUC devices at significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. The vulnerability involves incorrect default permissions, which typically means file/folder permissions that allow write access to privileged locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.78.2.0.7

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html

Restart Required: Yes

Instructions:

1. Download the updated Intel NUC HDMI Firmware Update Tool version 1.78.2.0.7 or later from Intel's website. 2. Uninstall any previous versions of the tool. 3. Install the updated version. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Remove vulnerable tool

windows

Uninstall the Intel NUC HDMI Firmware Update Tool if not needed

Control Panel > Programs > Uninstall a program > Select 'Intel NUC HDMI Firmware Update Tool' > Uninstall

Restrict local access

all

Implement strict access controls to limit who can log into affected NUC systems

🧯 If You Can't Patch

  • Remove the Intel NUC HDMI Firmware Update Tool from affected systems if firmware updates are not required
  • Implement strict user access controls and follow least privilege principles to limit which users can authenticate to affected systems

🔍 How to Verify

Check if Vulnerable:

Check if Intel NUC HDMI Firmware Update Tool is installed and check its version in Control Panel > Programs > Programs and Features

Check Version:

wmic product where name='Intel NUC HDMI Firmware Update Tool' get version

Verify Fix Applied:

Verify the installed version is 1.78.2.0.7 or later in Control Panel > Programs > Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected privilege escalation events
  • Security logs showing users gaining SYSTEM privileges unexpectedly
  • Application logs showing the HDMI firmware tool being accessed or modified

Network Indicators:

  • Unusual outbound connections from NUC systems after local access
  • Lateral movement attempts from NUC systems to other network resources

SIEM Query:

EventID=4688 AND (NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%') AND SubjectUserName NOT IN (authorized_admin_users) AND ComputerName LIKE '%NUC10%'

🔗 References

📤 Share & Export