CVE-2024-27200

4.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with local access to potentially escalate privileges on systems running vulnerable Intel Granulate software. It affects organizations using Intel Granulate versions before 4.30.1 for performance optimization. The issue stems from improper access control mechanisms.

💻 Affected Systems

Products:
  • Intel Granulate software
Versions: All versions before 4.30.1
Operating Systems: Linux (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access and local system access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could gain administrative privileges on the host system, potentially compromising the entire server and adjacent systems.

🟠

Likely Case

A legitimate user with standard permissions could elevate their privileges to perform unauthorized administrative actions within the Granulate environment.

🟢

If Mitigated

With proper access controls and least privilege principles, impact would be limited to the Granulate application scope only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and local system privileges. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.30.1 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01145.html

Restart Required: Yes

Instructions:

1. Download Intel Granulate version 4.30.1 or later from Intel's official distribution channels. 2. Follow Intel's upgrade documentation for your deployment method (container, package manager, or manual). 3. Restart the Granulate service after installation.

🔧 Temporary Workarounds

Restrict local access

all

Limit local system access to only trusted administrators who require it for their duties.

Implement least privilege

all

Ensure all user accounts have only the minimum permissions necessary for their roles.

🧯 If You Can't Patch

  • Isolate Granulate systems from critical infrastructure using network segmentation
  • Implement strict monitoring and alerting for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check the installed Granulate version using 'granoctl version' or examine the container image tag if deployed via containers.

Check Version:

granoctl version

Verify Fix Applied:

Confirm version is 4.30.1 or higher using 'granoctl version' command and verify no privilege escalation anomalies in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in system logs
  • Unauthorized access attempts to privileged Granulate functions

Network Indicators:

  • Unusual outbound connections from Granulate hosts

SIEM Query:

source="granulate" AND (event_type="privilege_escalation" OR user_change="admin")

🔗 References

📤 Share & Export