CVE-2024-37355
📋 TL;DR
This vulnerability in Intel Graphics software allows authenticated local users to escalate privileges by bypassing access controls. It affects systems with vulnerable Intel Graphics drivers installed. Attackers could gain higher system privileges than intended.
💻 Affected Systems
- Intel Graphics Drivers
- Intel Graphics Software
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.
Likely Case
Local authenticated users (including low-privilege accounts) escalate to administrative privileges to install malware, modify system settings, or access protected data.
If Mitigated
With proper access controls and least privilege principles, impact is limited to the compromised user's scope, though privilege escalation remains possible.
🎯 Exploit Status
Requires local authenticated access and knowledge of vulnerable component interaction. No public exploit code known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Intel DSA or Windows Update for latest graphics driver versions
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html
Restart Required: No
Instructions:
1. Visit Intel Driver & Support Assistant (DSA) or Windows Update. 2. Check for Intel Graphics driver updates. 3. Install latest version. 4. Verify installation via device manager.
🔧 Temporary Workarounds
Restrict Local User Privileges
allApply least privilege principles to limit authenticated users' access rights.
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized process execution
- Use endpoint detection and response (EDR) to monitor for privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check Intel Graphics driver version in Device Manager (Windows) or via 'lspci -v' (Linux) and compare with patched versions in Intel advisory.
Check Version:
Windows: 'wmic path win32_VideoController get DriverVersion' | Linux: Check driver version via package manager or modinfo
Verify Fix Applied:
Confirm Intel Graphics driver version matches or exceeds patched version listed in Intel advisory.
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- Intel Graphics service anomalies
- Process creation with elevated privileges from non-admin users
Network Indicators:
- None - local exploitation only
SIEM Query:
EventID=4688 AND NewProcessName contains * AND SubjectUserName NOT IN (admin_list) AND TokenElevationType=2