CVE-2024-21784

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel IPP Cryptography software allows authenticated local users to escalate privileges by manipulating the DLL search path. It affects systems running vulnerable versions of Intel IPP Cryptography software before version 2021.11.

💻 Affected Systems

Products:
  • Intel IPP Cryptography software
Versions: All versions before 2021.11
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel IPP Cryptography software to be installed and the attacker to have local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, potentially leading to complete system compromise.

🟠

Likely Case

Local authenticated users could elevate their privileges to administrator/root level on the system.

🟢

If Mitigated

With proper access controls and patching, the risk is limited to authorized users who already have some system access.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local authenticated users could exploit this, but requires initial access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local authenticated access and knowledge of DLL search path manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.11 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01114.html

Restart Required: Yes

Instructions:

1. Download Intel IPP Cryptography version 2021.11 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict DLL search path

all

Configure system to restrict DLL search path to trusted directories only

Windows: Use Group Policy to set SafeDllSearchMode=1
Linux: Set LD_LIBRARY_PATH to trusted directories only

Remove vulnerable software

all

Uninstall Intel IPP Cryptography software if not required

Windows: Control Panel > Programs > Uninstall Intel IPP Cryptography
Linux: sudo apt-get remove ipp-crypto (or equivalent package manager command)

🧯 If You Can't Patch

  • Implement strict access controls to limit local authenticated users
  • Monitor for suspicious DLL loading behavior and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel IPP Cryptography version - if below 2021.11, system is vulnerable

Check Version:

Windows: Check installed programs list. Linux: rpm -qa | grep ipp-crypto or dpkg -l | grep ipp-crypto

Verify Fix Applied:

Verify Intel IPP Cryptography version is 2021.11 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading from non-standard paths
  • Privilege escalation attempts
  • Process execution with elevated privileges

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Process creation events where parent process is Intel IPP software and child process has elevated privileges

🔗 References

📤 Share & Export