CVE-2023-28741

7.9 HIGH

📋 TL;DR

A buffer overflow vulnerability in Intel QAT drivers for Windows allows authenticated local users to potentially escalate privileges. This affects systems using Intel QuickAssist Technology hardware version 1.0 with vulnerable driver versions. Attackers could gain elevated system privileges on affected Windows machines.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) drivers for Windows
Versions: HW Version 1.0 drivers before version 1.10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel QAT hardware version 1.0 with vulnerable driver installed. Systems without QAT hardware or with newer hardware versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM-level privileges, allowing complete control over the affected system, data theft, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation from standard user to administrator/SYSTEM privileges, enabling installation of malware, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact due to proper access controls, monitoring, and defense-in-depth measures preventing successful exploitation.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Authenticated users on affected systems could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of buffer overflow exploitation techniques. No public exploit code has been disclosed as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.10 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html

Restart Required: Yes

Instructions:

1. Download Intel QAT driver version 1.10 or later from Intel's website. 2. Uninstall current QAT driver. 3. Install updated driver. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Disable QAT functionality

windows

Temporarily disable Intel QuickAssist Technology if not required for system operation

Disable via Device Manager: Right-click QAT device > Disable device

Restrict local access

all

Limit local user access to systems with vulnerable drivers

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Enable enhanced monitoring and logging for privilege escalation attempts on affected systems

🔍 How to Verify

Check if Vulnerable:

Check Device Manager for Intel QAT device properties, driver version should be 1.10 or higher. Alternatively, run: wmic path win32_pnpentity where "deviceid like '%VEN_8086&DEV_0B30%'" get caption,driverVersion

Check Version:

wmic path win32_pnpentity where "deviceid like '%VEN_8086&DEV_0B30%'" get caption,driverVersion

Verify Fix Applied:

Verify driver version shows 1.10 or higher in Device Manager or via wmic command. Confirm system stability after driver update.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing driver loading/unloading anomalies
  • Security logs showing privilege escalation attempts
  • System logs with QAT driver errors

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%qat%' OR CommandLine LIKE '%qat%') AND NewProcessName='cmd.exe' OR 'powershell.exe'

🔗 References

📤 Share & Export