CVE-2024-34164

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel MAS software allows authenticated local users to escalate privileges by manipulating the search path. It affects systems running vulnerable versions of Intel MAS software with authenticated local access.

💻 Affected Systems

Products:
  • Intel(R) MAS (Memory Analysis Software)
Versions: Versions before 2.5
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access to the system. Intel MAS must be installed and vulnerable version in use.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Authenticated users with limited privileges gain elevated system access, potentially installing malware, accessing sensitive data, or modifying system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Authenticated users on affected systems could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and ability to manipulate search path elements. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.5 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01161.html

Restart Required: Yes

Instructions:

1. Download Intel MAS version 2.5 or later from Intel's official website. 2. Run the installer with administrative privileges. 3. Follow installation prompts. 4. Restart the system to complete the update.

🔧 Temporary Workarounds

Restrict local user permissions

all

Limit authenticated users' ability to write to directories in the search path

Remove vulnerable software

all

Uninstall Intel MAS if not required for operations

sudo apt remove intel-mas
winget uninstall Intel.MAS

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable Intel MAS installed
  • Implement strict file system permissions and monitor for unauthorized privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel MAS version: On Windows, check Programs and Features. On Linux, check package manager or run 'intel-mas --version' if available.

Check Version:

On Windows: Check in Control Panel > Programs and Features. On Linux: dpkg -l | grep intel-mas or rpm -qa | grep intel-mas

Verify Fix Applied:

Confirm Intel MAS version is 2.5 or higher using version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Intel MAS process spawning with elevated privileges
  • File writes to Intel MAS directories by non-admin users

Network Indicators:

  • Not network exploitable - focus on local system monitoring

SIEM Query:

EventID=4688 AND ProcessName LIKE '%intel-mas%' AND NewProcessName LIKE '%cmd%' OR '%powershell%' OR '%bash%'

🔗 References

📤 Share & Export