CVE-2023-28714

8.2 HIGH

📋 TL;DR

This vulnerability allows a privileged user on a Windows system with affected Intel WiFi software to escalate their privileges locally. It affects systems running Intel PROSet/Wireless WiFi software before version 22.220 HF. The improper access control in firmware could enable attackers to gain higher system privileges than intended.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi software for Windows
Versions: All versions before 22.220 HF (Hot Fix)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel WiFi adapters using the vulnerable firmware/software stack. Requires local privileged access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial privileged access could achieve full system compromise, install persistent malware, access sensitive data, or disable security controls.

🟠

Likely Case

Malicious insiders or compromised privileged accounts could escalate to SYSTEM-level privileges to maintain persistence or bypass security controls.

🟢

If Mitigated

With proper patch management and least privilege principles, the impact is limited to systems where attackers already have privileged access.

🌐 Internet-Facing: LOW - This requires local access and privileged user credentials, making remote exploitation unlikely.
🏢 Internal Only: HIGH - Internal attackers with privileged access could exploit this to gain full system control on affected workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local privileged access and knowledge of the vulnerability. No public exploit code has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.220 HF (Hot Fix) or later

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html

Restart Required: Yes

Instructions:

1. Download the updated Intel PROSet/Wireless WiFi software version 22.220 HF or later from Intel's website. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Intel PROSet/Wireless WiFi software if not required

Control Panel > Programs > Uninstall a program > Select Intel PROSet/Wireless WiFi > Uninstall

Use Windows built-in WiFi drivers

windows

Replace Intel software with Microsoft's built-in WiFi drivers

Device Manager > Network adapters > Right-click Intel WiFi adapter > Update driver > Browse my computer > Let me pick > Select Microsoft driver

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit who has local administrative access
  • Monitor for privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Intel PROSet/Wireless WiFi software version in Control Panel > Programs or via 'wmic product get name,version' command

Check Version:

wmic product where "name like '%Intel%PROSet%Wireless%WiFi%'" get name,version

Verify Fix Applied:

Verify installed version is 22.220 HF or later and check that no privilege escalation attempts are detected

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in Windows Security logs
  • Suspicious process creation with SYSTEM privileges from non-system accounts

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%system32%' AND SubjectUserName NOT IN ('SYSTEM', 'LOCAL SERVICE', 'NETWORK SERVICE')

🔗 References

📤 Share & Export