CVE-2023-40155

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel CST software allows authenticated local users to escalate privileges by manipulating the software's search path. It affects systems running vulnerable versions of Intel CST software, primarily impacting environments where multiple users have local access to systems with this software installed.

💻 Affected Systems

Products:
  • Intel(R) CST (Converged Security and Manageability Engine) software
Versions: Versions before 2.1.10300
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel CST software to be installed and the attacker to have authenticated local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrative/root privileges on the system, potentially compromising the entire host and any data/services running on it.

🟠

Likely Case

An authenticated user with malicious intent elevates their privileges to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

With proper access controls and patching, the risk is limited to authorized users who would already have legitimate access to the system.

🌐 Internet-Facing: LOW - This requires local authenticated access, making remote exploitation unlikely unless combined with other vulnerabilities.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, particularly in shared or multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local authenticated access and knowledge of the system's configuration. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.10300 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01021.html

Restart Required: Yes

Instructions:

1. Download Intel CST version 2.1.10300 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts to only trusted personnel and implement least privilege principles.

Remove unnecessary Intel CST installations

all

Uninstall Intel CST software from systems where it is not required for business operations.

On Windows: Control Panel > Programs > Uninstall a program > Select Intel CST > Uninstall
On Linux: Use package manager to remove intel-cst package

🧯 If You Can't Patch

  • Implement strict access controls to limit which users have local login privileges to affected systems.
  • Monitor systems for unusual privilege escalation attempts using security logging and auditing tools.

🔍 How to Verify

Check if Vulnerable:

Check the installed Intel CST version. On Windows: Check Programs and Features. On Linux: Check package manager or run 'intel-cst --version' if available.

Check Version:

Windows: Check via Control Panel or registry. Linux: 'rpm -qa | grep intel-cst' or 'dpkg -l | grep intel-cst'

Verify Fix Applied:

Verify that Intel CST version is 2.1.10300 or higher using the same version check methods.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in system logs
  • Unauthorized access to sensitive directories by non-admin users
  • Intel CST process spawning with elevated privileges

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic unless combined with other attacks

SIEM Query:

EventID=4688 AND ProcessName LIKE '%cst%' AND NewProcessName LIKE '%cmd%' OR EventID=4672 AND AccountName NOT IN (admin_users)

🔗 References

📤 Share & Export