CVE-2024-38387

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Graphics Driver installers allows authenticated local users to escalate privileges by exploiting an uncontrolled search path. It affects systems running Intel Graphics Driver versions 15.40 and 15.45. Attackers could gain elevated system access by placing malicious files in locations the installer searches.

💻 Affected Systems

Products:
  • Intel(R) Graphics Driver
Versions: Versions 15.40 and 15.45
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where these specific driver versions are installed. Requires authenticated user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/root privileges, allowing complete control over the affected system, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation to administrator/root level, enabling installation of malware, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact with proper user privilege separation and application control policies preventing unauthorized program execution.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires authenticated local access, but insider threats or compromised accounts could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and ability to place files in specific directories. No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Intel Graphics Driver version 15.46 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01191.html

Restart Required: Yes

Instructions:

1. Download latest Intel Graphics Driver from Intel's official website. 2. Uninstall current vulnerable driver via Control Panel. 3. Install updated driver. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Restrict installer execution

windows

Prevent execution of Intel Graphics Driver installers from untrusted locations using application control policies.

Using Windows AppLocker or similar: Create rule blocking execution of Intel installer executables from user-writable directories.

Remove vulnerable drivers

windows

Uninstall affected Intel Graphics Driver versions if not essential for system operation.

Control Panel > Programs and Features > Uninstall Intel Graphics Driver 15.40 or 15.45

🧯 If You Can't Patch

  • Implement least privilege principles - ensure users don't have administrative rights unnecessarily
  • Monitor for suspicious file creation in system directories and installer execution events

🔍 How to Verify

Check if Vulnerable:

Check installed Intel Graphics Driver version via Device Manager > Display adapters > Intel Graphics > Properties > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%Intel%Graphics%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 15.46 or higher after update using same method

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Process creation events for Intel installer executables from unusual locations
  • Security logs: Privilege escalation attempts following installer execution

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND (ProcessName="*Intel*Installer*" OR ProcessName="*igfx*install*") AND (CommandLine contains ".exe" AND NOT Image contains "C:\Program Files")

🔗 References

📤 Share & Export