CVE-2023-45736

6.7 MEDIUM

📋 TL;DR

Intel Power Gadget for Windows has insecure inherited permissions that allow authenticated local users to escalate privileges. This affects all versions of the software on Windows systems where the vulnerable component is installed. An attacker with standard user access could potentially gain higher privileges.

💻 Affected Systems

Products:
  • Intel(R) Power Gadget software
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Intel Power Gadget. The vulnerability is in the permission inheritance mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM-level privileges, enabling complete system compromise, installation of malware, or disabling security controls.

🟠

Likely Case

Local authenticated user elevates to administrator privileges to install unauthorized software, modify system configurations, or access protected data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to users who already have administrative access to affected systems.

🌐 Internet-Facing: LOW - This vulnerability requires local authenticated access and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - While it requires local access, it could be exploited by malicious insiders or attackers who have already compromised user credentials on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. The CWE-277 (Insecure Inherited Permissions) suggests the vulnerability involves improper permission inheritance that can be leveraged for privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Intel has released updated versions addressing this vulnerability

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html

Restart Required: Yes

Instructions:

1. Visit Intel Security Advisory INTEL-SA-01037. 2. Download the latest version of Intel Power Gadget. 3. Uninstall the current version. 4. Install the updated version. 5. Restart the system.

🔧 Temporary Workarounds

Remove Intel Power Gadget

windows

Uninstall Intel Power Gadget software if not required for system functionality

Control Panel > Programs > Uninstall a program > Select Intel Power Gadget > Uninstall

Restrict Access Permissions

windows

Manually adjust file and folder permissions for Intel Power Gadget installation to restrict access

icacls "C:\Program Files\Intel\Power Gadget" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Remove Intel Power Gadget software from all systems where it is not essential
  • Implement strict access controls and monitor for privilege escalation attempts on systems with the software installed

🔍 How to Verify

Check if Vulnerable:

Check if Intel Power Gadget is installed via Control Panel > Programs and Features or using PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel*Power*Gadget*'}

Check Version:

Check program version in Control Panel or via registry: reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s | findstr /i "Intel Power Gadget"

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version from Intel's advisory, and check that the software has been updated or removed

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts, unexpected process elevation, or unauthorized access to Intel Power Gadget files

Network Indicators:

  • No network indicators as this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND (NewProcessName contains "powershell.exe" OR NewProcessName contains "cmd.exe") AND CommandLine contains "Intel" AND CommandLine contains "Power Gadget"

🔗 References

📤 Share & Export