CVE-2023-42099

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems running Intel Driver & Support Assistant (DSA) by exploiting a symbolic link issue in the DSA Service to delete files. Attackers must first have low-privileged code execution on the target. It affects users of Intel DSA on Windows systems.

💻 Affected Systems

Products:
  • Intel Driver & Support Assistant (DSA)
Versions: Versions prior to the patched release; specific version range not detailed in CVE, but check Intel advisory for updates.
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the DSA Service component; default installations are likely vulnerable if not updated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains SYSTEM privileges, enabling full system compromise, arbitrary code execution, and potential data theft or system destruction.

🟠

Likely Case

Local privilege escalation to SYSTEM, allowing installation of malware, persistence mechanisms, or lateral movement within a network.

🟢

If Mitigated

Limited impact if least privilege principles are enforced and the service is restricted, though local access could still lead to privilege escalation.

🌐 Internet-Facing: LOW, as exploitation requires local access; not directly exploitable over the internet.
🏢 Internal Only: HIGH, as internal attackers with low privileges can exploit it to gain SYSTEM access, posing significant risk in enterprise environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to create symbolic links; no public proof-of-concept known, but details are disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Intel DSA updates; refer to vendor advisory for specific version.

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html

Restart Required: Yes

Instructions:

1. Open Intel Driver & Support Assistant. 2. Check for updates and install any available patches. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Disable or Remove Intel DSA

windows

Uninstall Intel Driver & Support Assistant to eliminate the vulnerability if not needed.

Control Panel > Programs > Uninstall a program > Select Intel Driver & Support Assistant > Uninstall

Restrict Service Permissions

windows

Limit the DSA Service to run with minimal privileges using Group Policy or local security settings.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from executing code on affected systems.
  • Monitor for suspicious activity related to symbolic link creation or file deletion in system logs.

🔍 How to Verify

Check if Vulnerable:

Check the version of Intel DSA installed; if it's an older version without the patch, it is likely vulnerable.

Check Version:

Open Intel Driver & Support Assistant and check the version in the application settings or via 'About' section.

Verify Fix Applied:

Verify that Intel DSA has been updated to the latest version and no longer exhibits the symbolic link vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Event logs showing symbolic link creation or file deletion by the DSA Service process.
  • Unusual privilege escalation attempts from low-privileged accounts.

Network Indicators:

  • None, as this is a local vulnerability with no network component.

SIEM Query:

Example: EventID 4688 or 4663 on Windows with process name containing 'DSA' and actions like 'Delete' or 'Create Symbolic Link'.

🔗 References

📤 Share & Export