CVE-2024-36253

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel SDP Tool for Windows allows authenticated local users to escalate privileges by manipulating the software's search path. Attackers could execute arbitrary code with higher system permissions. All versions of the software on Windows systems are affected.

💻 Affected Systems

Products:
  • Intel(R) SDP Tool for Windows
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the Windows system where the Intel SDP Tool is installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an authenticated attacker gains SYSTEM/administrator privileges, enabling complete control over the affected system.

🟠

Likely Case

Local privilege escalation allowing authenticated users to bypass security controls and gain elevated permissions for persistence or lateral movement.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and privilege escalation attempts are monitored.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any authenticated local user could potentially exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of DLL hijacking/search path manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version from Intel (check advisory for specific version)

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01179.html

Restart Required: Yes

Instructions:

1. Visit Intel Security Advisory INTEL-SA-01179. 2. Download latest Intel SDP Tool version. 3. Uninstall current version. 4. Install updated version. 5. Restart system.

🔧 Temporary Workarounds

Remove Intel SDP Tool

windows

Uninstall the Intel SDP Tool if not required for operations

Control Panel > Programs > Uninstall a program > Select Intel SDP Tool > Uninstall

Restrict Local User Access

windows

Limit local user accounts on systems with Intel SDP Tool installed

🧯 If You Can't Patch

  • Remove or restrict Intel SDP Tool to essential systems only
  • Implement strict local user account controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Intel SDP Tool is installed via Programs and Features or using: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel SDP*'}

Check Version:

Check version in Control Panel > Programs > Intel SDP Tool properties or via vendor documentation

Verify Fix Applied:

Verify Intel SDP Tool version matches latest from Intel advisory and check installation date

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Intel SDP Tool directories
  • DLL loading from unusual locations
  • Privilege escalation events in Windows Security logs

Network Indicators:

  • Not network exploitable - local privilege escalation only

SIEM Query:

Process creation where parent process contains 'sdp' or 'intel' AND child process has elevated privileges

🔗 References

📤 Share & Export