CVE-2024-28028

7.5 HIGH

📋 TL;DR

An improper input validation vulnerability in Intel Neural Compressor software allows unauthenticated attackers on adjacent networks to potentially escalate privileges. This affects users running Intel Neural Compressor versions before v3.0. The vulnerability requires network adjacency to the target system.

💻 Affected Systems

Products:
  • Intel Neural Compressor
Versions: All versions before v3.0
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires Intel Neural Compressor to be installed and accessible on the network. Adjacent network access needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker on the same network could gain elevated privileges on the system, potentially leading to full system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to execute code with higher privileges than intended, potentially compromising the host system.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated segments with minimal blast radius.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Can be exploited by any attacker on the same internal network segment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network adjacency and knowledge of vulnerable service. No authentication needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.0 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html

Restart Required: Yes

Instructions:

1. Download Intel Neural Compressor v3.0 or later from official Intel sources. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system or service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Intel Neural Compressor services to only trusted hosts

# Use firewall rules to restrict access
# Example for Linux iptables:
iptables -A INPUT -p tcp --dport [NEURAL_COMPRESSOR_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [NEURAL_COMPRESSOR_PORT] -j DROP

Service Isolation

linux

Run Intel Neural Compressor in isolated network namespace or container

# Example using Docker network isolation
docker run --network isolated_network -d intel/neural-compressor

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with the Neural Compressor service
  • Monitor network traffic to/from Neural Compressor ports for suspicious activity and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel Neural Compressor version. If version is below 3.0, the system is vulnerable.

Check Version:

# For Python installations:
pip show neural-compressor
# Or check package version in application

Verify Fix Applied:

Verify Intel Neural Compressor version is 3.0 or higher and check that the service is running with the updated binaries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Neural Compressor service
  • Failed authentication attempts to Neural Compressor
  • Privilege escalation events

Network Indicators:

  • Unexpected network connections to Neural Compressor ports from unauthorized hosts
  • Anomalous traffic patterns to Neural Compressor service

SIEM Query:

source="neural-compressor.log" AND (event_type="privilege_escalation" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export