CVE-2024-21818

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel PCM software allows authenticated local users to escalate privileges by manipulating the software's search path. It affects systems running vulnerable versions of Intel PCM software. Attackers could gain higher system permissions than intended.

💻 Affected Systems

Products:
  • Intel(R) Performance Counter Monitor (PCM)
Versions: All versions before 202311
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access. PCM software must be installed and accessible to the attacker.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Authenticated user with standard privileges escalates to administrative rights, potentially installing malware or accessing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal attackers with standard credentials could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of DLL hijacking/search path manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 202311 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01035.html

Restart Required: Yes

Instructions:

1. Download Intel PCM version 202311 or later from Intel's website. 2. Uninstall previous vulnerable version. 3. Install updated version. 4. Restart system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict PCM Execution

all

Limit which users can execute Intel PCM software to prevent exploitation.

Windows: Use Group Policy to restrict PCM executable access
Linux: Use chmod to restrict PCM binary permissions

Remove Unnecessary PCM Installations

all

Uninstall Intel PCM from systems where it's not required for operations.

Windows: Control Panel > Programs > Uninstall Intel PCM
Linux: sudo apt remove intel-pcm (Debian/Ubuntu) or sudo yum remove intel-pcm (RHEL/CentOS)

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute Intel PCM software
  • Monitor for unusual process execution or privilege escalation attempts involving PCM

🔍 How to Verify

Check if Vulnerable:

Check Intel PCM version. If version is earlier than 202311, system is vulnerable.

Check Version:

Windows: pcm-sensor.exe --version | Linux: pcm-sensor --version

Verify Fix Applied:

Confirm Intel PCM version is 202311 or later and test that search path manipulation no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from non-standard paths
  • Privilege escalation attempts involving PCM executables
  • DLL loading from user-writable directories

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Process creation where (parent_process contains 'pcm' OR image contains 'pcm') AND (command_line contains 'dll' OR command_line contains 'path')

🔗 References

📤 Share & Export