CVE-2024-24852

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Ethernet Adapter drivers allows authenticated local users to escalate privileges by manipulating the DLL search path during installation. It affects systems running vulnerable driver versions before 29.1. Attackers could gain SYSTEM-level access on affected Windows systems.

💻 Affected Systems

Products:
  • Intel Ethernet Adapter Complete Driver Pack
Versions: All versions before 29.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with vulnerable driver versions installed. Requires authenticated user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains SYSTEM privileges, enabling complete system compromise, persistence installation, and lateral movement.

🟠

Likely Case

Malicious insider or compromised user account escalates to administrative privileges to install malware or access sensitive data.

🟢

If Mitigated

With proper privilege separation and monitoring, impact limited to user-level compromise without escalation.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local authenticated access is common in enterprise environments, enabling privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerability requiring authenticated user to trigger installation or have write access to search paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 29.1 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html

Restart Required: Yes

Instructions:

1. Download Intel Ethernet Adapter Complete Driver Pack version 29.1 or later from Intel website. 2. Run installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies to restrict DLL search order and prevent loading from untrusted directories.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Remove vulnerable drivers

windows

Uninstall vulnerable driver versions if not required for system functionality.

pnputil /delete-driver oem#.inf /uninstall
dism /online /get-drivers /format:table

🧯 If You Can't Patch

  • Implement least privilege - ensure users don't have administrative rights or write access to system directories.
  • Monitor for suspicious DLL loading events and installation attempts using Windows Event Logs or EDR solutions.

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under Network adapters > Intel Ethernet adapter > Driver tab, or run: pnputil /enum-drivers | findstr "Intel Ethernet"

Check Version:

pnputil /enum-drivers | findstr /i "intel ethernet"

Verify Fix Applied:

Verify driver version is 29.1 or higher in Device Manager or using: Get-WindowsDriver -Online | Where-Object {$_.Driver -like "*Intel*Ethernet*"} | Select-Object Driver, Version

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation
  • DLL loading from unusual paths
  • Privilege escalation attempts

Network Indicators:

  • Unusual outbound connections post-privilege escalation

SIEM Query:

source="windows" (event_id=7045 AND service_name="*Intel*Ethernet*") OR (event_id=4688 AND process_name="*setup*.exe" AND command_line="*Intel*Ethernet*")

🔗 References

📤 Share & Export