CVE-2024-32938

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel MPI Library for Windows allows authenticated local users to escalate privileges by manipulating the DLL search path. Attackers could gain higher system permissions by placing malicious files in directories searched before legitimate ones. Only Windows systems running vulnerable Intel MPI Library versions are affected.

💻 Affected Systems

Products:
  • Intel MPI Library for Windows
Versions: All versions before 2021.13
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires Intel MPI Library to be installed and used.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Privileged user or malware with initial access escalates to higher privileges, potentially bypassing security controls and accessing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and blocked before privilege escalation occurs.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires authenticated access and specific software installation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and ability to place files in specific directories. DLL hijacking/search order attacks are well-understood techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.13 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html

Restart Required: Yes

Instructions:

1. Download Intel MPI Library version 2021.13 or later from Intel's website. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Set strict permissions on directories where Intel MPI Library searches for DLLs to prevent unauthorized file placement.

icacls "C:\Program Files\Intel\mpi\" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

Use SafeDllSearchMode

windows

Enable Safe DLL Search Mode to prioritize system directories over current directory.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run Intel MPI applications
  • Monitor for suspicious DLL loading events and file creation in Intel MPI directories

🔍 How to Verify

Check if Vulnerable:

Check Intel MPI Library version via Control Panel > Programs and Features or run 'wmic product where "name like 'Intel%MPI%'" get version'

Check Version:

wmic product where "name like 'Intel%MPI%'" get version

Verify Fix Applied:

Verify installed version is 2021.13 or higher using same version check methods

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing Intel MPI processes loading DLLs from unusual locations
  • Sysmon Event ID 7 (image loaded) showing DLLs loaded from non-standard paths

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=7) AND process_name="*mpi*" AND (image_loaded="*\Temp\*" OR image_loaded="*\Users\*\*" OR image_loaded="*\Downloads\*")

🔗 References

📤 Share & Export