CVE-2024-36291

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Chipset Software Installation Utility allows authenticated local users to escalate privileges by manipulating the search path. It affects systems running vulnerable versions of the utility, primarily impacting Windows environments where this Intel software is installed.

💻 Affected Systems

Products:
  • Intel(R) Chipset Software Installation Utility
Versions: All versions before 10.1.19867.8574
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel Chipset Software Installation Utility is installed. Many systems may have this utility installed by OEMs or during driver updates.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/administrator privileges, potentially leading to complete system compromise, data theft, or installation of persistent malware.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) could elevate to administrator privileges to bypass security controls or install unauthorized software.

🟢

If Mitigated

With proper access controls and patching, the risk is limited to authorized users who would need physical or remote desktop access to the system.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires authenticated access to the vulnerable system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access and knowledge of DLL search order hijacking techniques. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.19867.8574 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01184.html

Restart Required: Yes

Instructions:

1. Download the latest Intel Chipset Software Installation Utility from Intel's website. 2. Uninstall the current version. 3. Install the updated version 10.1.19867.8574 or later. 4. Restart the system.

🔧 Temporary Workarounds

Restrict local access

windows

Limit physical and remote desktop access to trusted users only

Remove vulnerable utility

windows

Uninstall Intel Chipset Software Installation Utility if not required

Control Panel > Programs > Uninstall a program > Select 'Intel(R) Chipset Software Installation Utility' > Uninstall

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local login privileges
  • Monitor for privilege escalation attempts and unusual process behavior

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'Intel(R) Chipset Software Installation Utility' and verify version is below 10.1.19867.8574

Check Version:

wmic product where "name like 'Intel%%Chipset%%Software%%Installation%%Utility'" get version

Verify Fix Applied:

Confirm the utility version is 10.1.19867.8574 or later in installed programs list

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation, unusual process creation from chipset utility paths
  • Security logs showing users gaining higher privileges unexpectedly

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%infinst.exe%' OR ProcessName LIKE '%IntelChipset%') AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%')

🔗 References

📤 Share & Export