CVE-2023-43629

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users with local access to systems running vulnerable Intel GPA software to escalate privileges due to incorrect default permissions in installers. It affects systems with Intel GPA software versions before 2023.3 installed.

💻 Affected Systems

Products:
  • Intel(R) Graphics Performance Analyzers (GPA)
Versions: All versions before 2023.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel GPA software is installed. The vulnerability is in the installer permissions, not the runtime software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, enabling complete compromise and persistence.

🟠

Likely Case

Local authenticated users could elevate their privileges to administrator/root level to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to authorized users who already have some level of system access.

🌐 Internet-Facing: LOW - This vulnerability requires local access and authentication, making remote exploitation unlikely.
🏢 Internal Only: HIGH - This poses significant risk in internal environments where authenticated users could exploit it for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the vulnerable installer location/permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.3 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00831.html

Restart Required: No

Instructions:

1. Download Intel GPA version 2023.3 or later from Intel's website. 2. Uninstall previous versions. 3. Install the updated version. 4. Verify installation and permissions.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Intel GPA software if not required for operations

Control Panel > Programs > Uninstall a program > Select Intel GPA > Uninstall

Restrict installer permissions

windows

Manually adjust permissions on GPA installer files to prevent unauthorized execution

icacls "C:\Program Files\Intel\GPA\*" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Remove Intel GPA software from systems where it's not essential
  • Implement strict access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel GPA version: On Windows, check Programs and Features or run 'wmic product where name="Intel(R) Graphics Performance Analyzers" get version'. On Linux, check installation directory for version info.

Check Version:

wmic product where name="Intel(R) Graphics Performance Analyzers" get version

Verify Fix Applied:

Verify installed version is 2023.3 or later using the same version check methods.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • Process creation events for GPA installer components with elevated privileges

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%gpa%' OR ProcessName LIKE '%IntelGPA%') AND NewProcessName LIKE '%cmd%' OR NewProcessName LIKE '%powershell%')

🔗 References

📤 Share & Export