CVE-2024-21799

7.1 HIGH

📋 TL;DR

This path traversal vulnerability in Intel Extension for Transformers allows authenticated local users to access files outside intended directories, potentially leading to privilege escalation. It affects users running vulnerable versions of this AI acceleration software. Attackers need local authenticated access to exploit this flaw.

💻 Affected Systems

Products:
  • Intel Extension for Transformers
Versions: All versions before 1.5
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Extension for Transformers software installed and authenticated local access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains root/system privileges, accesses sensitive system files, and potentially installs persistent malware.

🟠

Likely Case

Authenticated user escalates privileges to access restricted files or modify configurations they shouldn't have access to.

🟢

If Mitigated

Attack limited to authenticated users with proper file permissions and access controls in place.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity once authenticated access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01190.html

Restart Required: Yes

Instructions:

1. Download Intel Extension for Transformers version 1.5 or later from official Intel sources. 2. Uninstall previous vulnerable version. 3. Install new version following Intel's installation guide. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict user access

all

Limit local user accounts that can access systems with Intel Extension for Transformers installed.

Implement strict file permissions

linux

Set restrictive permissions on Intel Extension for Transformers directories and files.

chmod 750 /path/to/intel-extension-directory
chown root:root /path/to/intel-extension-directory

🧯 If You Can't Patch

  • Remove Intel Extension for Transformers from systems where it's not essential
  • Implement strict access controls and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check installed version of Intel Extension for Transformers. If version is below 1.5, system is vulnerable.

Check Version:

python -c "import intel_extension_for_transformers; print(intel_extension_for_transformers.__version__)"

Verify Fix Applied:

Confirm Intel Extension for Transformers version is 1.5 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Intel Extension for Transformers directories
  • Failed privilege escalation attempts
  • Access to files outside expected directories

Network Indicators:

  • Local authentication events followed by unusual file operations

SIEM Query:

source="system_logs" AND (process="intel_extension" OR directory="*transformers*") AND (action="access" OR action="modify") AND path NOT CONTAINS "expected_directories"

🔗 References

📤 Share & Export