CVE-2023-32279

7.5 HIGH

📋 TL;DR

This vulnerability in Intel Connectivity Performance Suite's user mode driver allows unauthenticated attackers to potentially access sensitive information through network access. It affects systems running vulnerable versions of the software, primarily impacting users with this specific Intel software installed.

💻 Affected Systems

Products:
  • Intel Connectivity Performance Suite
Versions: All versions before 2.1123.214.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel Connectivity Performance Suite installed. The vulnerability is in the user mode driver component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated remote attacker could exfiltrate sensitive system information, configuration data, or potentially escalate to further system compromise.

🟠

Likely Case

Information disclosure of system configuration, driver data, or network-related information accessible to the vulnerable driver.

🟢

If Mitigated

No impact if patched version is installed or if vulnerable software is not present on the system.

🌐 Internet-Facing: MEDIUM - Requires network access but unauthenticated exploitation is possible if vulnerable service is exposed.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this for information gathering and potential lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Intel advisory indicates unauthenticated network access can lead to information disclosure, suggesting network-facing attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1123.214.2 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00944.html

Restart Required: Yes

Instructions:

1. Download Intel Connectivity Performance Suite version 2.1123.214.2 or later from Intel's official website. 2. Run the installer to update the software. 3. Restart the system to ensure the updated driver loads properly.

🔧 Temporary Workarounds

Network Access Restriction

windows

Block network access to the Intel Connectivity Performance Suite service/ports if not required for functionality.

netsh advfirewall firewall add rule name="Block Intel CPS" dir=in action=block program="C:\Program Files\Intel\Connectivity Performance Suite\*" enable=yes

Service Disablement

windows

Temporarily disable the Intel Connectivity Performance Suite service if not actively needed.

sc stop "Intel Connectivity Performance Suite"
sc config "Intel Connectivity Performance Suite" start= disabled

🧯 If You Can't Patch

  • Remove Intel Connectivity Performance Suite if not required for system functionality
  • Implement strict network segmentation to isolate systems with vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check installed version of Intel Connectivity Performance Suite in Control Panel > Programs and Features or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Connectivity Performance Suite*'} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Connectivity Performance Suite*'} | Select-Object Version

Verify Fix Applied:

Verify installed version is 2.1123.214.2 or later using same method as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to Intel CPS service ports
  • Failed authentication attempts to driver services
  • Unexpected process creation from Intel CPS components

Network Indicators:

  • Unusual traffic to/from Intel CPS default ports
  • Network scans targeting Intel CPS services

SIEM Query:

source="windows" AND (process_name="*Intel*Connectivity*Performance*Suite*" OR service_name="Intel Connectivity Performance Suite") AND (event_id=4688 OR event_id=5156)

🔗 References

📤 Share & Export