CVE-2024-28954

6.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated local users to escalate privileges due to incorrect default permissions in Intel Graphics Driver installers. Attackers could gain higher system privileges than intended. This affects systems with vulnerable Intel Graphics Driver versions installed.

💻 Affected Systems

Products:
  • Intel Graphics Drivers
Versions: Specific versions listed in Intel advisory INTEL-SA-01253
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where vulnerable Intel Graphics Driver versions are installed. Check Intel advisory for exact affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local user with standard privileges escalates to administrator/root to install malware, modify system configurations, or access protected data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to specific driver-related functions rather than full system compromise.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Insider threats or compromised local accounts could exploit this, but requires initial access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. Exploitation likely involves manipulating installer permissions to execute arbitrary code with elevated privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated drivers as specified in Intel advisory INTEL-SA-01253

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01253.html

Restart Required: Yes

Instructions:

1. Visit Intel's security advisory INTEL-SA-01253
2. Identify your affected driver version
3. Download and install the updated driver from Intel's official site
4. Restart the system

🔧 Temporary Workarounds

Restrict installer directory permissions

all

Manually set proper permissions on Intel Graphics Driver installation directories to prevent unauthorized access

Windows: icacls "C:\Intel\Graphics\" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"
Linux: chmod 755 /opt/intel/graphics/ && chown root:root /opt/intel/graphics/

🧯 If You Can't Patch

  • Implement strict least privilege principles for all user accounts
  • Monitor and audit file permission changes in Intel Graphics directories

🔍 How to Verify

Check if Vulnerable:

Check installed Intel Graphics Driver version against affected versions in Intel advisory INTEL-SA-01253

Check Version:

Windows: Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*Intel*Graphics*'} | Select-Object DeviceName, DriverVersion
Linux: modinfo i915 | grep version

Verify Fix Applied:

Verify driver version has been updated to patched version and check installer directory permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected permission changes in Intel Graphics directories
  • Process creation from Intel Graphics installer locations with elevated privileges
  • Failed privilege escalation attempts

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

Process creation where (parent_process contains 'intel' OR process_path contains 'intel') AND integrity_level changed

🔗 References

📤 Share & Export