CVE-2023-42773

8.8 HIGH

📋 TL;DR

This vulnerability in Intel Power Gadget software for Windows allows authenticated local users to potentially escalate privileges through improper input neutralization. It affects all versions of the software on Windows systems. Attackers could gain elevated system privileges by exploiting this flaw.

💻 Affected Systems

Products:
  • Intel Power Gadget software
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Intel Power Gadget. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing installation of malware, data theft, or persistence mechanisms.

🟠

Likely Case

Local privilege escalation to SYSTEM or admin level, enabling lateral movement within the network and bypassing security controls.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and software is updated promptly.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Any authenticated local user could potentially exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The CWE-707 (Improper Neutralization) suggests input validation/sanitization issues that could be leveraged for privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Intel recommends removing Intel Power Gadget software entirely as no patched version is available

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html

Restart Required: No

Instructions:

1. Uninstall Intel Power Gadget software from affected Windows systems
2. Verify removal using Windows Add/Remove Programs or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Power Gadget*'} | Select-Object Name, Version
3. Monitor for official updates from Intel

🔧 Temporary Workarounds

Remove Intel Power Gadget

windows

Uninstall the vulnerable software completely as no patch is available

Control Panel > Programs > Uninstall a program > Select Intel Power Gadget > Uninstall
Using PowerShell: Get-Package -Name '*Intel Power Gadget*' | Uninstall-Package

Restrict Local User Access

windows

Limit local user accounts on systems where Intel Power Gadget cannot be immediately removed

🧯 If You Can't Patch

  • Remove Intel Power Gadget software from all affected systems
  • Implement strict access controls to limit local user accounts on systems where the software must remain

🔍 How to Verify

Check if Vulnerable:

Check if Intel Power Gadget is installed: Control Panel > Programs > Look for 'Intel Power Gadget' or use PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Power Gadget*'}

Check Version:

PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Power Gadget*'} | Select-Object Name, Version

Verify Fix Applied:

Confirm Intel Power Gadget is not installed: PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel Power Gadget*'} should return no results

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Intel Power Gadget process execution with elevated privileges
  • Unexpected privilege escalation events from Intel Power Gadget processes

Network Indicators:

  • No direct network indicators as this is local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName LIKE '%PowerGadget%' AND NewProcessName NOT LIKE '%PowerGadget%' (for Windows Event Logs)

🔗 References

📤 Share & Export