CVE-2024-35245

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel PROSet/Wireless WiFi software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path element. It affects Windows systems running vulnerable versions of Intel wireless software. Attackers could gain higher system privileges than intended.

💻 Affected Systems

Products:
  • Intel(R) PROSet/Wireless WiFi software
Versions: All versions before 23.60
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel wireless adapters using vulnerable PROSet/Wireless software versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains SYSTEM/administrator privileges, enabling complete system compromise, persistence installation, and lateral movement.

🟠

Likely Case

Local user with standard privileges escalates to administrator to install malware, modify system settings, or access restricted data.

🟢

If Mitigated

With proper access controls and patching, impact limited to isolated systems with minimal business disruption.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit, but requires authenticated access and specific software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of DLL hijacking techniques. No public exploits known as of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.60 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01167.html

Restart Required: Yes

Instructions:

1. Download Intel PROSet/Wireless WiFi software version 23.60 or later from Intel website
2. Run installer with administrative privileges
3. Follow on-screen instructions
4. Restart system when prompted

🔧 Temporary Workarounds

Restrict DLL search path

windows

Configure Windows to restrict DLL search path using SafeDllSearchMode or SetDefaultDllDirectories

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Remove vulnerable software

windows

Uninstall Intel PROSet/Wireless WiFi software if not required

appwiz.cpl
Select Intel PROSet/Wireless WiFi software and click Uninstall

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable software
  • Implement application whitelisting to prevent unauthorized DLL loading

🔍 How to Verify

Check if Vulnerable:

Check Intel PROSet/Wireless WiFi software version in Control Panel > Programs and Features

Check Version:

wmic product where "name like 'Intel%PROSet%Wireless%'" get version

Verify Fix Applied:

Verify installed version is 23.60 or later in Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL loading from non-standard paths
  • Process creation with unexpected parent-child relationships
  • Windows Event ID 4688 with suspicious command lines

Network Indicators:

  • Not applicable - local privilege escalation

SIEM Query:

EventID=4688 AND (CommandLine LIKE "%rundll32%" OR CommandLine LIKE "%regsvr32%") AND ParentImage LIKE "%Intel%Wireless%"

🔗 References

📤 Share & Export