CVE-2022-36397

7.3 HIGH

📋 TL;DR

This vulnerability allows authenticated users on Linux systems with affected Intel QAT drivers to escalate privileges via local access due to incorrect default permissions in the software installer. It affects systems running Intel QuickAssist Technology drivers for Linux before version 4.17. The issue stems from improper file permissions that could allow local users to gain elevated privileges.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) drivers for Linux
Versions: All versions before 4.17
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT hardware and drivers installed. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated local attacker gains root privileges on the system, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Privileged local users or attackers with initial access escalate to root privileges to install malware, modify system configurations, or access sensitive data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized users only, though privilege escalation risk remains for authenticated users.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated local access, not remotely exploitable.
🏢 Internal Only: HIGH - Any authenticated user on affected systems can potentially escalate to root privileges, posing significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. The vulnerability involves incorrect file permissions that could be leveraged through standard privilege escalation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.17 and later

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html

Restart Required: Yes

Instructions:

1. Download Intel QAT driver version 4.17 or later from Intel's website. 2. Uninstall current QAT driver. 3. Install the updated driver. 4. Reboot the system to ensure changes take effect.

🔧 Temporary Workarounds

Manual permission correction

linux

Manually adjust file permissions on QAT driver files to restrict write access to privileged users only

chmod 755 /path/to/qat/files
chown root:root /path/to/qat/files

Access restriction

all

Restrict local access to systems with QAT drivers to only necessary privileged users

🧯 If You Can't Patch

  • Restrict local user access to only trusted administrators
  • Implement strict file integrity monitoring on QAT driver files and directories

🔍 How to Verify

Check if Vulnerable:

Check QAT driver version: 'modinfo qat' or check installed package version. If version is earlier than 4.17, system is vulnerable.

Check Version:

modinfo qat | grep version

Verify Fix Applied:

Verify QAT driver version is 4.17 or later: 'modinfo qat | grep version' should show version 4.17 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation attempts
  • Unauthorized access to QAT driver files
  • Changes to QAT driver permissions or ownership

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

source="linux_audit" AND (event_type="file_permission_change" AND file_path="/path/to/qat/*") OR (event_type="privilege_escalation" AND process_name="qat*")

🔗 References

📤 Share & Export