CVE-2024-21837

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Quartus Prime Lite Edition software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path (DLL hijacking). It affects users running vulnerable versions of this FPGA design software on Windows systems.

💻 Affected Systems

Products:
  • Intel Quartus Prime Lite Edition Design Software
Versions: All versions before 23.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires authenticated local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could execute arbitrary code with SYSTEM/administrator privileges, potentially gaining complete control of the affected system.

🟠

Likely Case

Local authenticated users could escalate privileges to administrator level, allowing them to install malware, modify system configurations, or access sensitive data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the user's own account scope.

🌐 Internet-Facing: LOW - This requires local authenticated access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Internal users with local access to affected systems could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity for local attackers with basic knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.1 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01055.html

Restart Required: Yes

Instructions:

1. Download Intel Quartus Prime Lite Edition version 23.1 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict DLL loading paths

windows

Configure Windows to restrict DLL search paths using application control policies or SafeDllSearchMode

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Apply least privilege

windows

Run Quartus software with standard user accounts instead of administrator accounts

🧯 If You Can't Patch

  • Remove local user access for untrusted users from systems running Quartus software
  • Implement application whitelisting to prevent execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check Quartus Prime version via Help > About in the application or examine installed programs in Control Panel

Check Version:

wmic product where "name like '%Quartus%'" get version

Verify Fix Applied:

Verify installed version is 23.1 or later and check that DLL hijacking protections are in place

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unexpected locations
  • Process creation events for Quartus executables with suspicious parent processes

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

source="Windows Security" EventCode=4688 ProcessName="*quartus*" OR ParentProcessName="*quartus*"

🔗 References

📤 Share & Export