CVE-2024-28887

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel IPP software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path (DLL hijacking). It affects systems running vulnerable versions of Intel IPP software before version 2021.11.

💻 Affected Systems

Products:
  • Intel Integrated Performance Primitives (IPP) software
Versions: All versions before 2021.11
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel IPP software installed and the attacker must have local authenticated access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges on the affected system, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local authenticated users could elevate their privileges to administrator/root level, allowing them to install malware, modify system configurations, or access restricted data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the user's own account scope.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Requires authenticated local access, but insider threats or compromised accounts could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity once the vulnerable path is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.11 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html

Restart Required: Yes

Instructions:

1. Download Intel IPP version 2021.11 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict DLL search path

windows

Set DLL search order to prioritize system directories over current directory

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

Remove write permissions from IPP directories

linux

Prevent users from placing malicious DLLs in IPP search paths

chmod -R o-w /opt/intel/ipp/
chmod -R g-w /opt/intel/ipp/

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local authenticated access to affected systems
  • Apply the principle of least privilege to ensure users don't have unnecessary permissions

🔍 How to Verify

Check if Vulnerable:

Check Intel IPP version: On Windows, check Programs and Features; On Linux, check /opt/intel/ipp/version.txt or run 'ippversion' command

Check Version:

On Linux: cat /opt/intel/ipp/version.txt || ippversion; On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Intel\IPP\Version

Verify Fix Applied:

Verify installed version is 2021.11 or later using the same methods as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from IPP directories
  • Failed DLL loading attempts from IPP paths
  • Privilege escalation events

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

Process creation where parent process is from IPP directory AND new process has higher privileges

🔗 References

📤 Share & Export