CVE-2021-33118
📋 TL;DR
This vulnerability allows authenticated users on affected Intel NUC 11 Gen systems to escalate privileges via the Intel Serial IO driver installer. Attackers with local access can exploit improper access controls to gain higher system privileges. Only systems running vulnerable versions of the Intel Serial IO driver are affected.
💻 Affected Systems
- Intel Serial IO driver for Intel NUC 11 Gen
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.
Likely Case
Local authenticated users (including low-privilege accounts) escalate to administrative privileges, allowing software installation, configuration changes, and access to protected resources.
If Mitigated
With proper access controls and least privilege principles, impact is limited to authorized administrative actions within the user's intended scope.
🎯 Exploit Status
Exploitation requires local authenticated access. The vulnerability is in the installer's access control mechanism.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 30.100.2104.1 or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html
Restart Required: Yes
Instructions:
1. Download Intel Serial IO driver version 30.100.2104.1 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart the system when prompted.
🔧 Temporary Workarounds
Restrict local access
allLimit local user access to affected systems to only trusted administrative users
Remove vulnerable driver
windowsUninstall the vulnerable Intel Serial IO driver if not required
Control Panel > Programs > Uninstall a program > Select 'Intel Serial IO' > Uninstall
🧯 If You Can't Patch
- Implement strict least privilege principles - ensure no users have unnecessary local access
- Monitor for privilege escalation attempts using security tools and audit logs
🔍 How to Verify
Check if Vulnerable:
Check driver version in Device Manager: Right-click Start > Device Manager > System devices > Intel Serial IO > Properties > Driver tab
Check Version:
wmic path Win32_PnPSignedDriver where "DeviceName like '%Intel Serial IO%'" get DeviceName, DriverVersion
Verify Fix Applied:
Verify driver version is 30.100.2104.1 or higher in Device Manager
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- Installation of Intel Serial IO driver by non-admin users
- Security log Event ID 4672 (special privileges assigned)
Network Indicators:
- None - this is a local privilege escalation
SIEM Query:
EventID=4672 AND ProcessName="*Intel*Serial*IO*" OR EventID=4688 AND NewProcessName="*Intel*Serial*IO*"