CVE-2023-39941

7.1 HIGH

📋 TL;DR

An improper access control vulnerability in Intel SUR software allows unauthenticated attackers on the same network segment to potentially cause denial of service. This affects organizations using vulnerable versions of Intel SUR software for system management and monitoring. The vulnerability requires adjacent network access but no authentication.

💻 Affected Systems

Products:
  • Intel(R) SUR software
Versions: All versions before 2.4.10587
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel SUR software installed and running. Requires network adjacency to the vulnerable system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of affected Intel SUR management systems, potentially impacting managed devices and monitoring capabilities across the network.

🟠

Likely Case

Temporary service degradation or crashes of Intel SUR software components, requiring system restarts to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls preventing adjacent network access from untrusted sources.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from the internet unless the service is exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices on the same network segment could exploit this to disrupt management services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required, but requires network adjacency. Exploit details not publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.10587

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html

Restart Required: Yes

Instructions:

1. Download Intel SUR version 2.4.10587 or later from Intel's official website. 2. Stop all Intel SUR services. 3. Install the updated version. 4. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Intel SUR management systems on separate VLANs or network segments to prevent adjacent access from untrusted devices.

Firewall Restrictions

all

Implement firewall rules to restrict access to Intel SUR services only from authorized management systems.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which devices can communicate with Intel SUR systems
  • Monitor Intel SUR service health and logs for signs of disruption or unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel SUR software version via the application interface or by examining installed programs list. Versions below 2.4.10587 are vulnerable.

Check Version:

On Windows: Check Programs and Features. On Linux: Check package manager or run 'intel-sur --version' if available.

Verify Fix Applied:

Confirm Intel SUR version is 2.4.10587 or higher and verify services are running normally without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes or restarts of Intel SUR components
  • Unauthorized connection attempts to Intel SUR services from adjacent network addresses

Network Indicators:

  • Unusual traffic patterns to Intel SUR service ports (default varies by configuration)
  • Connection attempts from unexpected internal IP addresses

SIEM Query:

source="intel-sur" AND (event_type="crash" OR event_type="service_stop") OR dest_port IN (Intel_SUR_ports) AND src_ip NOT IN (authorized_management_ips)

🔗 References

📤 Share & Export