CVE-2022-33190

7.1 HIGH

📋 TL;DR

This vulnerability in Intel(R) SUR software allows authenticated users with local access to potentially escalate privileges through improper input validation. It affects systems running vulnerable versions of Intel SUR software, primarily impacting enterprise environments where this management software is deployed.

💻 Affected Systems

Products:
  • Intel(R) SUR (System Usage Report)
Versions: All versions before 2.4.8902
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel SUR software to be installed and running. Typically found in enterprise environments for system monitoring and reporting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, potentially compromising the entire host and accessing sensitive data or deploying additional malware.

🟠

Likely Case

A malicious insider or compromised user account could elevate privileges to install persistent backdoors, access restricted system resources, or bypass security controls.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to the specific user's scope, though privilege escalation remains possible within that context.

🌐 Internet-Facing: LOW - This requires local access and authenticated user credentials, making remote exploitation unlikely without prior system access.
🏢 Internal Only: HIGH - This poses significant risk in internal environments where authenticated users could exploit the vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access. No public exploit code has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.8902 or later

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Restart Required: Yes

Instructions:

1. Download Intel SUR version 2.4.8902 or later from Intel's official website. 2. Stop the Intel SUR service. 3. Install the updated version. 4. Restart the system to ensure all components are properly updated.

🔧 Temporary Workarounds

Disable Intel SUR Service

windows

Temporarily disable the Intel SUR service to prevent exploitation while planning for patching.

sc stop "Intel(R) SUR Service"
sc config "Intel(R) SUR Service" start= disabled

Restrict User Privileges

all

Implement strict least privilege access controls to limit which users can interact with the Intel SUR software.

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems running vulnerable Intel SUR software
  • Enhance monitoring and logging for privilege escalation attempts on affected systems

🔍 How to Verify

Check if Vulnerable:

Check the Intel SUR software version via Control Panel > Programs and Features (Windows) or by running the SUR executable with version flag.

Check Version:

"C:\Program Files\Intel\SUR\sur.exe" --version (Windows) or /opt/intel/sur/bin/sur --version (Linux)

Verify Fix Applied:

Verify the installed version is 2.4.8902 or later and that the service is running properly after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation by Intel SUR components
  • Failed or successful privilege escalation attempts
  • Unexpected service restarts of Intel SUR

Network Indicators:

  • Unusual outbound connections from systems running Intel SUR

SIEM Query:

EventID=4688 AND ProcessName LIKE '%sur%' AND NewProcessName LIKE '%cmd%' OR '%powershell%'

🔗 References

📤 Share & Export