CVE-2022-21174

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users with local access to Intel Quartus Prime Pro Edition to escalate privileges through improper access control in a third-party component. It affects users running versions before 21.3 of this FPGA design software. The attack requires local system access and valid user credentials.

💻 Affected Systems

Products:
  • Intel Quartus Prime Pro Edition
Versions: All versions before 21.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Pro Edition, not Standard Edition. Requires local access and authenticated user credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrative control over the system, potentially installing malware, stealing intellectual property, or compromising other systems on the network.

🟠

Likely Case

A malicious insider or compromised user account escalates privileges to install unauthorized software, modify system configurations, or access restricted data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user's scope of access.

🌐 Internet-Facing: LOW - Requires local access and authenticated user credentials, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Internal users with legitimate access could exploit this, but requires local system access and authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of the vulnerable component. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.3 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html

Restart Required: Yes

Instructions:

1. Download Intel Quartus Prime Pro Edition version 21.3 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote local access to systems running Quartus Prime Pro Edition to only authorized personnel.

Implement Least Privilege

all

Ensure users only have the minimum necessary privileges for their roles, reducing impact if exploitation occurs.

🧯 If You Can't Patch

  • Isolate affected systems on network segments with strict access controls
  • Implement application allowlisting to prevent unauthorized software execution

🔍 How to Verify

Check if Vulnerable:

Check Quartus Prime version via Help > About in the GUI or run 'quartus_sh --version' in terminal/command prompt.

Check Version:

quartus_sh --version

Verify Fix Applied:

Verify version is 21.3 or higher using the same methods, and check that no unauthorized privilege changes have occurred.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access to system files or directories
  • Changes to user account permissions

Network Indicators:

  • Unusual outbound connections from Quartus Prime systems
  • Lateral movement attempts from affected systems

SIEM Query:

source="windows_security" EventID=4672 OR source="linux_auth" message="privilege escalation" AND process_name="quartus*"

🔗 References

📤 Share & Export