CVE-2023-24460

8.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users on a local system to escalate privileges due to incorrect default permissions in Intel GPA software installers. It affects systems running vulnerable versions of Intel GPA software before version 2023.3. Attackers could gain elevated system access by exploiting the insecure installer permissions.

💻 Affected Systems

Products:
  • Intel Graphics Performance Analyzers (GPA)
Versions: All versions before 2023.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel GPA software to be installed. The vulnerability is in the installer permissions, not the runtime software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full SYSTEM/root privileges on the affected machine, enabling complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) escalate to administrative privileges, allowing them to install malware, modify system configurations, or access protected data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized administrative users only.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated local access.
🏢 Internal Only: HIGH - Internal users with local access to vulnerable systems can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The vulnerability involves insecure file/folder permissions that could be manipulated for privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.3 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00831.html

Restart Required: Yes

Instructions:

1. Download Intel GPA version 2023.3 or later from Intel's official website. 2. Uninstall any previous vulnerable versions. 3. Install the updated version. 4. Restart the system to ensure all changes take effect.

🔧 Temporary Workarounds

Remove vulnerable Intel GPA software

windows

Uninstall Intel GPA software if not required for operations

Control Panel > Programs > Uninstall a program > Select Intel GPA > Uninstall

Restrict installer directory permissions

windows

Manually set secure permissions on Intel GPA installation directories

icacls "C:\Program Files\Intel\GPA" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Remove Intel GPA software if not essential for operations
  • Implement strict access controls and least privilege principles for all user accounts

🔍 How to Verify

Check if Vulnerable:

Check Intel GPA version: Open Intel GPA application and check Help > About, or check installed programs list for versions before 2023.3

Check Version:

On Windows: wmic product where "name like '%Intel%GPA%'" get version

Verify Fix Applied:

Verify Intel GPA version is 2023.3 or later, and check that installer directories have proper permissions set

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security logs showing privilege escalation attempts, Process creation logs for unexpected installer executions

Network Indicators:

  • No network indicators - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%gpa%' OR ProcessName LIKE '%intel%install%') AND NewProcessName LIKE '%cmd%' OR NewProcessName LIKE '%powershell%'

🔗 References

📤 Share & Export