CVE-2022-41699

8.2 HIGH

📋 TL;DR

This vulnerability in Intel QAT drivers for Windows allows authenticated local users to escalate privileges by exploiting incorrect permission assignments. It affects systems running vulnerable Intel QAT driver versions on Windows. Attackers could gain elevated system privileges.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) drivers for Windows
Versions: All versions before 1.9.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel QAT hardware and vulnerable driver versions installed. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/administrator privileges, allowing complete control over the affected system, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation to SYSTEM/administrator level, enabling installation of malware, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact with proper access controls, but still significant risk due to local authenticated access requirement.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Authenticated users (including low-privilege accounts) can exploit locally to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The CWE-732 (Incorrect Permission Assignment) suggests straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.0 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html

Restart Required: Yes

Instructions:

1. Download Intel QAT driver version 1.9.0 or later from Intel's website. 2. Uninstall current QAT driver. 3. Install updated driver. 4. Restart system.

🔧 Temporary Workarounds

Remove vulnerable driver

windows

Uninstall Intel QAT driver if not required for system functionality

Control Panel > Programs > Uninstall Intel QAT Driver

Restrict local access

windows

Implement strict local access controls and limit user privileges

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all user accounts
  • Monitor for suspicious privilege escalation attempts and driver manipulation

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under System devices > Intel(R) QuickAssist Technology or run: wmic path win32_pnpentity where "caption like '%Intel%QAT%'" get caption,driverVersion

Check Version:

wmic path win32_pnpentity where "caption like '%Intel%QAT%'" get caption,driverVersion

Verify Fix Applied:

Verify driver version is 1.9.0 or higher using same method as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing driver loading/unloading anomalies
  • Security logs showing privilege escalation attempts
  • System logs with unexpected driver modifications

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4697 OR EventID=7045 OR (EventID=4688 AND ProcessName contains 'qat')

🔗 References

📤 Share & Export