CVE-2022-42465

7.2 HIGH

📋 TL;DR

This vulnerability allows a privileged user on a local system to exploit improper access control in Intel's OFU kernel mode driver, potentially enabling privilege escalation. It affects systems running Intel OFU software versions before 14.1.30. The attacker needs local access and existing privileges to exploit this flaw.

💻 Affected Systems

Products:
  • Intel OFU (One Boot Flash Update) software
Versions: All versions before 14.1.30
Operating Systems: Windows, Linux systems using Intel OFU driver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel OFU software to be installed and the vulnerable kernel driver loaded. Systems without Intel OFU are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious privileged user could gain SYSTEM/root-level privileges, completely compromising the host and potentially accessing sensitive data or installing persistent malware.

🟠

Likely Case

An attacker with initial access could elevate privileges to bypass security controls, install additional tools, or maintain persistence on compromised systems.

🟢

If Mitigated

With proper privilege separation and least privilege principles, the impact is limited as the attacker already needs elevated privileges to exploit the vulnerability.

🌐 Internet-Facing: LOW - This requires local access and existing privileges, making remote exploitation unlikely without prior compromise.
🏢 Internal Only: MEDIUM - Insider threats or attackers who have already gained initial access could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and existing privileges. The vulnerability is in kernel mode, making exploitation more complex but potentially very powerful if successful.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.1.30 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00792.html

Restart Required: Yes

Instructions:

1. Download Intel OFU version 14.1.30 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Restart the system to load the updated kernel driver.

🔧 Temporary Workarounds

Disable Intel OFU driver

windows

Prevent loading of the vulnerable kernel driver if Intel OFU functionality is not required

sc config IntelOFU start= disabled
sc stop IntelOFU

Remove Intel OFU software

windows

Uninstall Intel OFU software completely if not needed

Control Panel > Programs > Uninstall Intel OFU

🧯 If You Can't Patch

  • Implement strict privilege separation and least privilege principles to limit users who could exploit this vulnerability
  • Monitor for suspicious privilege escalation attempts and kernel driver loading activities

🔍 How to Verify

Check if Vulnerable:

Check Intel OFU version: On Windows, check Programs and Features for Intel OFU version. On Linux, check package manager or installed software list.

Check Version:

On Windows: wmic product where name="Intel OFU" get version. On Linux: dpkg -l | grep ofu or rpm -qa | grep ofu

Verify Fix Applied:

Verify Intel OFU version is 14.1.30 or later and check that the driver is loaded without errors in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected kernel driver loading events
  • Privilege escalation attempts
  • IntelOFU service start/stop events

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=7045 OR EventID=4697 (Windows service installation) with IntelOFU in service name, OR Sysmon EventID=6 (Driver loaded) with IntelOFU in ImageLoaded

🔗 References

📤 Share & Export