CVE-2024-37355

8.8 HIGH

📋 TL;DR

This vulnerability in Intel Graphics software allows authenticated local users to escalate privileges by bypassing access controls. It affects systems with vulnerable Intel Graphics drivers installed. Attackers could gain higher system privileges than intended.

💻 Affected Systems

Products:
  • Intel Graphics Drivers
  • Intel Graphics Software
Versions: Specific versions listed in Intel advisory; typically multiple versions before patched releases.
Operating Systems: Windows, Linux, Other OS with Intel Graphics support
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Intel integrated or discrete graphics. Exact product list in Intel advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) escalate to administrative privileges to install malware, modify system settings, or access protected data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user's scope, though privilege escalation remains possible.

🌐 Internet-Facing: LOW - Requires local authenticated access; not directly exploitable over network.
🏢 Internal Only: HIGH - Local authenticated access is common in enterprise environments; successful exploitation gives attackers elevated privileges for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of vulnerable component interaction. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Intel DSA or Windows Update for latest graphics driver versions

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html

Restart Required: No

Instructions:

1. Visit Intel Driver & Support Assistant (DSA) or Windows Update. 2. Check for Intel Graphics driver updates. 3. Install latest version. 4. Verify installation via device manager.

🔧 Temporary Workarounds

Restrict Local User Privileges

all

Apply least privilege principles to limit authenticated users' access rights.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized process execution
  • Use endpoint detection and response (EDR) to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel Graphics driver version in Device Manager (Windows) or via 'lspci -v' (Linux) and compare with patched versions in Intel advisory.

Check Version:

Windows: 'wmic path win32_VideoController get DriverVersion' | Linux: Check driver version via package manager or modinfo

Verify Fix Applied:

Confirm Intel Graphics driver version matches or exceeds patched version listed in Intel advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Intel Graphics service anomalies
  • Process creation with elevated privileges from non-admin users

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName contains * AND SubjectUserName NOT IN (admin_list) AND TokenElevationType=2

🔗 References

📤 Share & Export