CVE-2023-42099
📋 TL;DR
This vulnerability allows local attackers to escalate privileges on systems running Intel Driver & Support Assistant (DSA) by exploiting a symbolic link issue in the DSA Service to delete files. Attackers must first have low-privileged code execution on the target. It affects users of Intel DSA on Windows systems.
💻 Affected Systems
- Intel Driver & Support Assistant (DSA)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains SYSTEM privileges, enabling full system compromise, arbitrary code execution, and potential data theft or system destruction.
Likely Case
Local privilege escalation to SYSTEM, allowing installation of malware, persistence mechanisms, or lateral movement within a network.
If Mitigated
Limited impact if least privilege principles are enforced and the service is restricted, though local access could still lead to privilege escalation.
🎯 Exploit Status
Exploitation requires local access and ability to create symbolic links; no public proof-of-concept known, but details are disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Intel DSA updates; refer to vendor advisory for specific version.
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
Restart Required: Yes
Instructions:
1. Open Intel Driver & Support Assistant. 2. Check for updates and install any available patches. 3. Restart the system to ensure changes take effect.
🔧 Temporary Workarounds
Disable or Remove Intel DSA
windowsUninstall Intel Driver & Support Assistant to eliminate the vulnerability if not needed.
Control Panel > Programs > Uninstall a program > Select Intel Driver & Support Assistant > Uninstall
Restrict Service Permissions
windowsLimit the DSA Service to run with minimal privileges using Group Policy or local security settings.
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local users from executing code on affected systems.
- Monitor for suspicious activity related to symbolic link creation or file deletion in system logs.
🔍 How to Verify
Check if Vulnerable:
Check the version of Intel DSA installed; if it's an older version without the patch, it is likely vulnerable.
Check Version:
Open Intel Driver & Support Assistant and check the version in the application settings or via 'About' section.
Verify Fix Applied:
Verify that Intel DSA has been updated to the latest version and no longer exhibits the symbolic link vulnerability.
📡 Detection & Monitoring
Log Indicators:
- Event logs showing symbolic link creation or file deletion by the DSA Service process.
- Unusual privilege escalation attempts from low-privileged accounts.
Network Indicators:
- None, as this is a local vulnerability with no network component.
SIEM Query:
Example: EventID 4688 or 4663 on Windows with process name containing 'DSA' and actions like 'Delete' or 'Create Symbolic Link'.