CVE-2023-22292

7.3 HIGH

📋 TL;DR

This vulnerability in Intel Unison software allows authenticated local users to trigger an uncaught exception that could lead to privilege escalation. Attackers could gain higher system privileges than intended. This affects systems running vulnerable versions of Intel Unison software.

💻 Affected Systems

Products:
  • Intel Unison
Versions: Versions before the patched release
Operating Systems: Windows, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Intel Unison software across multiple platforms where the vulnerable component is present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected machine, potentially compromising the entire system and accessing sensitive data.

🟠

Likely Case

Local authenticated users could elevate their privileges to perform unauthorized administrative actions on the system.

🟢

If Mitigated

With proper access controls and least privilege principles, impact would be limited to the compromised user account scope.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires authenticated local access, but insider threats or compromised accounts could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and specific conditions to trigger the uncaught exception.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Intel Security Advisory for specific patched versions

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html

Restart Required: Yes

Instructions:

1. Visit Intel Security Advisory SA-00963. 2. Download and install the latest Intel Unison update. 3. Restart the system. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local authenticated access to systems running Intel Unison to trusted users only.

Disable Intel Unison

all

Temporarily disable or uninstall Intel Unison if not required for operations.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for all user accounts
  • Monitor for privilege escalation attempts and unusual local user activity

🔍 How to Verify

Check if Vulnerable:

Check Intel Unison version against patched versions listed in Intel Security Advisory SA-00963.

Check Version:

Check Intel Unison application settings or About section for version information.

Verify Fix Applied:

Verify Intel Unison version is updated to patched version specified in advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Intel Unison crash logs or exception reports
  • Failed or successful local authentication attempts followed by privilege changes

Network Indicators:

  • Local system calls indicating privilege escalation

SIEM Query:

EventID=4688 OR EventID=4672 AND ProcessName contains 'Unison' OR SourceModuleName contains 'Intel'

🔗 References

📤 Share & Export