CVE-2023-45217

8.8 HIGH

📋 TL;DR

This vulnerability in Intel Power Gadget software allows authenticated local users to escalate privileges on Windows systems. Attackers could gain SYSTEM-level access by exploiting improper access controls. All Windows users running Intel Power Gadget are affected.

💻 Affected Systems

Products:
  • Intel Power Gadget
Versions: All versions for Windows
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Intel Power Gadget. Requires local authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of malware, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install additional tools, or access restricted system resources.

🟢

If Mitigated

Limited impact if proper user access controls and least privilege principles are enforced, though local authenticated users could still exploit.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Any authenticated local user (including standard users) can potentially exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access but is likely straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Intel recommends removing Intel Power Gadget entirely as no patched version exists

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html

Restart Required: No

Instructions:

1. Uninstall Intel Power Gadget via Control Panel > Programs and Features. 2. Verify removal by checking Program Files and registry entries. 3. Consider using alternative power monitoring tools.

🔧 Temporary Workarounds

Remove Intel Power Gadget

windows

Uninstall the vulnerable software completely

wmic product where name="Intel Power Gadget" call uninstall /nointeractive

Restrict User Access

windows

Apply strict access controls to limit who can run the software

icacls "C:\Program Files\Intel\Power Gadget\*" /deny Users:(RX)

🧯 If You Can't Patch

  • Remove Intel Power Gadget from all systems immediately
  • Implement strict least privilege principles and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Intel Power Gadget is installed via Control Panel > Programs and Features or by looking for 'Intel Power Gadget' in installed programs list

Check Version:

wmic product where name="Intel Power Gadget" get version

Verify Fix Applied:

Confirm Intel Power Gadget is no longer installed and related files/folders are removed from Program Files

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with process name containing 'PowerGadget' or 'Intel Power Gadget'
  • Unexpected privilege escalation events from standard user accounts

Network Indicators:

  • No network indicators as this is local privilege escalation

SIEM Query:

source="windows_security" EventID=4688 AND (ProcessName="*PowerGadget*" OR ProcessName="*Intel Power Gadget*")

🔗 References

📤 Share & Export