CVE-2024-22184

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Quartus Prime Pro Edition Design Software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path. It affects users running versions before 24.1 of this FPGA design software. Attackers could potentially gain higher system privileges than intended.

💻 Affected Systems

Products:
  • Intel Quartus Prime Pro Edition Design Software
Versions: All versions before 24.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system running the software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the host machine, potentially compromising the entire system and accessing sensitive design files.

🟠

Likely Case

Local authenticated users could elevate to administrator privileges, allowing them to install malicious software, modify system configurations, or access protected design data.

🟢

If Mitigated

With proper user privilege separation and application whitelisting, impact would be limited to the user's own account scope.

🌐 Internet-Facing: LOW - This requires local access and authenticated user context, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal users with legitimate access could exploit this to gain elevated privileges on shared engineering workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of DLL hijacking/search order hijacking techniques and local system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.1 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01127.html

Restart Required: Yes

Instructions:

1. Download Intel Quartus Prime Pro Edition version 24.1 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict user privileges

all

Run Quartus software with minimal necessary privileges using standard user accounts instead of administrator accounts.

Enable DLL Safe Search Mode (Windows)

windows

Configure Windows to use Safe DLL Search Mode which searches system directories first.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict user privilege separation - ensure Quartus users run with standard user accounts only
  • Monitor for suspicious process creation and DLL loading events from Quartus executables

🔍 How to Verify

Check if Vulnerable:

Check Quartus Prime version via Help > About in the software GUI or check installed programs list for versions earlier than 24.1.

Check Version:

On Windows: Check Add/Remove Programs. On Linux: Check package manager or run 'quartus --version' if available.

Verify Fix Applied:

Verify installed version is 24.1 or later and check that the software runs with proper privilege restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Quartus processes running with elevated privileges from standard user accounts
  • DLL loading from unusual paths

Network Indicators:

  • Not applicable - local vulnerability only

SIEM Query:

Process creation where parent_process contains 'quartus' and integrity_level changes from Medium to High/System

🔗 References

📤 Share & Export