CVE-2023-31360

7.3 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems with AMD Integrated Management Technology (AIM-T) Manageability Service installed. Attackers can exploit incorrect default permissions in the installation directory to execute arbitrary code with elevated privileges. This affects systems running vulnerable versions of AMD AIM-T software.

💻 Affected Systems

Products:
  • AMD Integrated Management Technology (AIM-T) Manageability Service
Versions: Versions prior to the fix
Operating Systems: Windows systems with AMD AIM-T installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where AMD AIM-T Manageability Service is installed. Not all AMD systems have this component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to install persistent malware, steal sensitive data, or disable security controls.

🟠

Likely Case

Local privilege escalation enabling attackers to gain administrative access to the system and potentially pivot to other systems on the network.

🟢

If Mitigated

Limited impact if proper access controls and least privilege principles are enforced, though the vulnerability still presents a security risk.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with local access (including compromised user accounts) can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the system. Exploitation involves manipulating files in the vulnerable directory to achieve privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to the latest version as specified in AMD advisory

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9012.html

Restart Required: No

Instructions:

1. Review AMD Security Bulletin SB-9012. 2. Download the latest AMD AIM-T Manageability Service update from AMD's official website. 3. Install the update following AMD's instructions. 4. Verify the installation completed successfully.

🔧 Temporary Workarounds

Adjust directory permissions

windows

Manually set proper permissions on the AMD AIM-T installation directory to restrict write access to authorized users only.

icacls "C:\Program Files\AMD\AIM-T" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"
icacls "C:\Program Files (x86)\AMD\AIM-T" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Remove or disable AMD AIM-T Manageability Service if not required for system functionality
  • Implement strict access controls and monitor for unauthorized file modifications in the AIM-T directory

🔍 How to Verify

Check if Vulnerable:

Check if AMD AIM-T Manageability Service is installed and review directory permissions on the installation folder for excessive write permissions.

Check Version:

Check the version in Programs and Features or examine the AIM-T service properties

Verify Fix Applied:

Verify the AMD AIM-T version has been updated to the patched version and confirm directory permissions have been properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file creation/modification in AMD AIM-T directories
  • Process execution from AIM-T directories by non-privileged users
  • Security log events showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from systems with AIM-T after local compromise

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%AIM-T%' OR NewProcessName LIKE '%AIM-T%') AND SubjectUserName NOT IN ('SYSTEM', 'Administrator')

🔗 References

📤 Share & Export