CVE-2023-43747

6.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with local access to escalate privileges due to incorrect default permissions in Intel Connectivity Performance Suite installers. It affects systems running affected versions of this Intel software. Attackers could gain elevated system privileges.

💻 Affected Systems

Products:
  • Intel Connectivity Performance Suite
Versions: All versions before 2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel Connectivity Performance Suite is installed. Requires local authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full SYSTEM/root privileges on the affected machine, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) escalate to administrative privileges to install malware, modify system configurations, or access restricted data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized users who already have some level of system access.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Any authenticated user on affected systems can potentially exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. The vulnerability is in installer permissions, making exploitation relatively straightforward for authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.0 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01102.html

Restart Required: Yes

Instructions:

1. Download Intel Connectivity Performance Suite version 2.0 or later from Intel's official website. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Intel Connectivity Performance Suite if not required

Control Panel > Programs > Uninstall a program > Select Intel Connectivity Performance Suite > Uninstall

Restrict installer permissions

windows

Manually adjust permissions on installer files to prevent unauthorized execution

icacls "C:\Program Files\Intel\Connectivity Performance Suite\*" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users only have necessary permissions
  • Monitor for privilege escalation attempts and unauthorized installer executions

🔍 How to Verify

Check if Vulnerable:

Check installed programs for Intel Connectivity Performance Suite version earlier than 2.0

Check Version:

wmic product where "name like 'Intel Connectivity Performance Suite%'" get version

Verify Fix Applied:

Verify Intel Connectivity Performance Suite version is 2.0 or later in installed programs list

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • Security logs with unexpected process elevation
  • Installer execution by non-admin users

Network Indicators:

  • Not applicable - local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Intel Connectivity Performance Suite%' AND NewProcessName LIKE '%powershell%' OR NewProcessName LIKE '%cmd%'

🔗 References

📤 Share & Export