CVE-2024-39365

6.7 MEDIUM

📋 TL;DR

This vulnerability allows an authenticated attacker with local access to escalate privileges on Windows systems by exploiting an uncontrolled search path in Intel's FPGA Support Package for the oneAPI DPC++/C++ Compiler. The attacker could place malicious DLLs in directories searched by the vulnerable software. Only users running affected versions of the Intel compiler software on Windows are impacted.

💻 Affected Systems

Products:
  • Intel oneAPI DPC++/C++ Compiler with FPGA Support Package
Versions: All versions before 2024.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations with the FPGA Support Package component. Linux and other OS versions are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM/administrator privileges on the Windows host, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Authenticated users (including low-privilege accounts) escalate to administrator privileges on their local machine, potentially accessing sensitive data or installing malware.

🟢

If Mitigated

With proper access controls and limited local user privileges, impact is contained to the compromised user's context without system-wide compromise.

🌐 Internet-Facing: LOW - This requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access to affected systems could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access and knowledge of DLL search order hijacking techniques. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.2 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01218.html

Restart Required: Yes

Instructions:

1. Download Intel oneAPI DPC++/C++ Compiler version 2024.2 or later from Intel's website. 2. Run the installer and follow prompts to update. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict DLL search path

windows

Use Windows policies or application controls to restrict where DLLs can be loaded from for the vulnerable software.

Use Windows AppLocker or Software Restriction Policies to block DLL execution from user-writable directories

Remove vulnerable component

windows

Uninstall the FPGA Support Package if not required for your workflow.

Control Panel > Programs and Features > Intel oneAPI DPC++/C++ Compiler > Modify > Deselect FPGA Support Package

🧯 If You Can't Patch

  • Restrict local user privileges to prevent authenticated users from writing to directories in the DLL search path
  • Implement strict file integrity monitoring on directories where the vulnerable software searches for DLLs

🔍 How to Verify

Check if Vulnerable:

Check Intel oneAPI version: Open Intel oneAPI command prompt and run 'icpx --version' or check installed programs in Control Panel for version number.

Check Version:

icpx --version

Verify Fix Applied:

Confirm version is 2024.2 or later using 'icpx --version' command and verify FPGA Support Package is updated.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations (Event ID 7 in Microsoft-Windows-Diagnostics-Performance)
  • Unexpected privilege escalation events (Event ID 4672)

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=7 AND (ImagePath contains "icpx" OR ImagePath contains "dpcpp") AND FileLoad contains ".dll" AND NOT FileLoad contains "System32"

🔗 References

📤 Share & Export