CVE-2022-45112

7.3 HIGH

📋 TL;DR

This vulnerability in Intel VROC software allows authenticated users with local access to potentially escalate privileges due to improper access control. It affects systems running vulnerable versions of Intel VROC software, primarily impacting enterprise servers with Intel RAID configurations.

💻 Affected Systems

Products:
  • Intel Virtual RAID on CPU (VROC) software
Versions: All versions before 8.0.0.4035
Operating Systems: Windows Server, Linux distributions supporting Intel VROC
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel VROC enabled for RAID configurations on supported Intel platforms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain full administrative control over the system, potentially compromising the entire server and accessing sensitive data.

🟠

Likely Case

A malicious insider or compromised account could elevate privileges to gain unauthorized access to system resources and configuration settings.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users who would need to bypass additional security layers.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: HIGH - Local authenticated access is common in enterprise environments, making this a significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access but the access control bypass appears straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.0.4035 or later

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00846.html

Restart Required: Yes

Instructions:

1. Download Intel VROC version 8.0.0.4035 or later from Intel's website. 2. Stop any RAID operations. 3. Install the update following Intel's installation guide. 4. Reboot the system.

🔧 Temporary Workarounds

Restrict local access

all

Limit local console and remote desktop access to only necessary administrative personnel

Implement privilege separation

all

Ensure users with local access do not have unnecessary permissions that could be leveraged

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate affected systems from critical network segments and implement additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check Intel VROC software version via Intel RAID Web Console or command line interface

Check Version:

On Linux: 'rpm -qa | grep vroc' or 'dpkg -l | grep vroc'. On Windows: Check Programs and Features or use 'wmic product get name,version'

Verify Fix Applied:

Verify installed version is 8.0.0.4035 or higher and test privilege escalation attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful privilege escalation attempts in system logs
  • Unauthorized access to VROC management functions

Network Indicators:

  • Unusual local authentication patterns followed by administrative actions

SIEM Query:

source="system_logs" AND (event_type="privilege_escalation" OR process_name="vroc*") AND result="success"

🔗 References

📤 Share & Export