CVE-2024-29223

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel QuickAssist Technology software allows authenticated local users to escalate privileges by manipulating the search path for DLL files. It affects systems running Intel QAT software versions before 2.2.0 with local user access.

💻 Affected Systems

Products:
  • Intel QuickAssist Technology (QAT) software
Versions: All versions before 2.2.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel QAT software installed and local authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Local authenticated user elevates to administrator privileges to install malware, modify system configurations, or access restricted data.

🟢

If Mitigated

With proper access controls and patching, impact limited to failed privilege escalation attempts with audit logging.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with local accounts could exploit, but requires authenticated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and ability to place malicious DLL in search path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html

Restart Required: Yes

Instructions:

1. Download Intel QAT software version 2.2.0 or later from Intel website. 2. Uninstall previous QAT software. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict DLL search path permissions

all

Set strict permissions on directories in DLL search path to prevent unauthorized DLL placement

Windows: icacls "C:\Program Files\Intel\QAT" /deny Users:(OI)(CI)W
Linux: chmod 755 /usr/lib64/libqat.so && chown root:root /usr/lib64/libqat.so

Enable Safe DLL Search Mode

all

Configure system to search system directories first before current directory

Windows: Set registry key HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SafeDllSearchMode to 1
Linux: Ensure LD_LIBRARY_PATH is properly secured

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for suspicious DLL loading events and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel QAT software version: Windows - Check Programs and Features; Linux - rpm -qa | grep qat or dpkg -l | grep qat

Check Version:

Windows: wmic product where "name like '%Intel%QuickAssist%'" get version; Linux: qat_service -v 2>/dev/null || echo "Check package manager"

Verify Fix Applied:

Confirm Intel QAT version is 2.2.0 or later using version check command

📡 Detection & Monitoring

Log Indicators:

  • Failed privilege escalation attempts
  • Unauthorized DLL loading from non-system paths
  • Process execution with unexpected parent/child relationships

Network Indicators:

  • Not network exploitable - focus on host-based detection

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%qat%' OR ParentProcessName LIKE '%qat%') AND NewProcessName NOT IN ('expected_qat_processes')

🔗 References

📤 Share & Export