CVE-2022-32764

7.5 HIGH

📋 TL;DR

A race condition vulnerability in Intel Data Streaming Accelerator (DSA) software allows authenticated local users to potentially escalate privileges. This affects systems running vulnerable versions of Intel DSA software, primarily impacting servers and workstations with Intel hardware acceleration capabilities.

💻 Affected Systems

Products:
  • Intel Data Streaming Accelerator (DSA) software
Versions: All versions before 22.4.26
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel DSA driver installed. Typically found on servers and workstations with Intel Xeon Scalable Processors or Intel Core processors supporting DSA.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains root/system-level privileges, potentially compromising the entire system and accessing sensitive data or deploying persistent malware.

🟠

Likely Case

Privileged user escalates to higher privileges, enabling unauthorized access to restricted resources or system modifications.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated privilege escalation attempts that can be detected and contained.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Requires authenticated local access, but insider threats or compromised accounts could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and race condition timing to exploit successfully.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4.26 or later

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html

Restart Required: Yes

Instructions:

1. Download Intel DSA version 22.4.26 or later from Intel's website. 2. Stop any DSA-related services. 3. Install the updated driver package. 4. Reboot the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts to only trusted personnel and implement least privilege principles.

Disable DSA if not needed

linux

If Intel DSA functionality is not required, disable or remove the driver.

sudo modprobe -r idxd
sudo systemctl disable idxd

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate affected systems from critical network segments and limit user access

🔍 How to Verify

Check if Vulnerable:

Check Intel DSA driver version using 'idxd-config --version' on Linux or Device Manager on Windows.

Check Version:

idxd-config --version

Verify Fix Applied:

Verify installed version is 22.4.26 or later using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Multiple rapid DSA driver access attempts
  • Failed authentication attempts followed by successful privilege changes

Network Indicators:

  • Not applicable - local exploit only

SIEM Query:

EventID=4688 OR ProcessName='idxd' AND (CommandLine LIKE '%privilege%' OR ParentProcessName='cmd.exe')

🔗 References

📤 Share & Export