CVE-2024-22476

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in Intel Neural Compressor software allows unauthenticated remote attackers to execute arbitrary code with elevated privileges through improper input validation. It affects all systems running Intel Neural Compressor versions before 2.5.0. The CVSS 10.0 score indicates maximum severity with network-based exploitation possible without authentication.

💻 Affected Systems

Products:
  • Intel Neural Compressor
Versions: All versions before 2.5.0
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration of affected versions. Any system with Intel Neural Compressor installed and network-accessible is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root/admin privileges, data exfiltration, ransomware deployment, and persistent backdoor installation across the network.

🟠

Likely Case

Remote code execution leading to data theft, lateral movement within the network, and installation of cryptocurrency miners or botnet clients.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and least-privilege access controls prevent remote access to vulnerable instances.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has low exploit complexity according to CVSS metrics, making it attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.0

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01109.html

Restart Required: Yes

Instructions:

1. Download Intel Neural Compressor version 2.5.0 or later from official Intel sources. 2. Uninstall the vulnerable version. 3. Install the patched version. 4. Restart the system or service.

🔧 Temporary Workarounds

Network Isolation

all

Block all network access to Intel Neural Compressor instances using firewall rules

# Linux iptables example: sudo iptables -A INPUT -p tcp --dport [PORT] -j DROP
# Windows firewall: New-NetFirewallRule -DisplayName "Block Intel Neural Compressor" -Direction Inbound -Protocol TCP -LocalPort [PORT] -Action Block

Service Disablement

all

Disable or stop the Intel Neural Compressor service if not actively needed

# Linux: sudo systemctl stop neural-compressor
# Windows: Stop-Service -Name "IntelNeuralCompressor"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from critical assets
  • Deploy application-level firewalls or WAF rules to filter malicious input patterns

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Intel Neural Compressor. If version is below 2.5.0, the system is vulnerable.

Check Version:

# Linux: neural-compressor --version
# Windows: Check installed programs in Control Panel or run: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Intel Neural Compressor*"}

Verify Fix Applied:

Confirm version 2.5.0 or later is installed and verify the service is running without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from neural-compressor service
  • Failed authentication attempts followed by successful exploitation
  • Abnormal network connections from neural-compressor process

Network Indicators:

  • Unexpected outbound connections from neural-compressor ports
  • Traffic patterns indicating reverse shells or command execution

SIEM Query:

source="neural-compressor.log" AND (event="process_creation" OR event="network_connection") AND (process_name!="expected_process" OR dest_ip!="expected_ip")

🔗 References

📤 Share & Export