CVE-2024-29083

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Distribution for Python allows authenticated local users to escalate privileges due to incorrect default file permissions. It affects systems running vulnerable versions of Intel's Python distribution. Attackers could gain elevated system access by exploiting these permission issues.

💻 Affected Systems

Products:
  • Intel Distribution for Python
Versions: All versions before 2024.2
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel Distribution for Python is installed. Standard Python distributions are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrative/root privileges on the system, enabling complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local authenticated users (including low-privileged accounts) gain elevated privileges to modify system files, install software, or access restricted data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the specific user's scope, though privilege escalation remains possible within that context.

🌐 Internet-Facing: LOW - This requires local authenticated access, making remote exploitation unlikely without additional vulnerabilities.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, particularly in shared or multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the vulnerable file locations. No public exploit code has been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.2 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01165.html

Restart Required: No

Instructions:

1. Download Intel Distribution for Python version 2024.2 or later from Intel's official distribution channels. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Verify the installation is complete and functioning.

🔧 Temporary Workarounds

Manual Permission Correction

all

Manually adjust file permissions on Intel Python distribution files to restrict write access to authorized users only.

# Linux/macOS: Check and fix permissions
find /opt/intel/oneapi/intelpython -type f -perm /o+w -ls
find /opt/intel/oneapi/intelpython -type f -perm /o+w -exec chmod o-w {} \;
# Windows: Use icacls to remove write permissions for non-admin users
icacls "C:\Program Files\Intel\oneAPI\intelpython\*" /deny "Users:(W)"

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to systems with vulnerable Intel Python installations.
  • Monitor for suspicious privilege escalation attempts and file permission changes in system logs.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Intel Distribution for Python. On Linux/macOS: 'conda list | grep intelpython' or check installation directory. On Windows: Check 'Program Files\Intel\oneAPI\intelpython' directory version.

Check Version:

conda list | grep intelpython  # or check /opt/intel/oneapi/intelpython/version.txt on Linux

Verify Fix Applied:

Confirm version is 2024.2 or later using 'conda list | grep intelpython' or checking the installation directory. Verify file permissions don't allow world-writable access.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • File permission changes in Intel Python directories
  • Unauthorized access attempts to system files

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic unless post-exploitation activity occurs

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%python%' OR CommandLine LIKE '%intelpython%') AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%'

🔗 References

📤 Share & Export