CVE-2024-45067

8.2 HIGH

📋 TL;DR

This vulnerability in Intel Gaudi software installers allows authenticated local users to escalate privileges due to incorrect default file permissions. It affects systems running Intel Gaudi software versions before 1.18. Attackers with local access can exploit this to gain elevated system privileges.

💻 Affected Systems

Products:
  • Intel Gaudi software installers
Versions: All versions before 1.18
Operating Systems: Linux (primary), potentially other OS where Gaudi software is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel Gaudi software installed. Requires authenticated local user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an authenticated attacker gains root/administrator privileges, potentially installing persistent malware, accessing sensitive data, or disrupting operations.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install unauthorized software, or access restricted system resources.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented to restrict local user access.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal users with local access can exploit this vulnerability to escalate privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The vulnerability involves file permission issues that could be exploited through standard privilege escalation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.18 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01271.html

Restart Required: Yes

Instructions:

1. Download Intel Gaudi software version 1.18 or later from Intel's official website. 2. Uninstall previous vulnerable versions. 3. Install the updated version following Intel's installation guide. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict file permissions manually

linux

Manually adjust permissions on Gaudi installer files to restrict write access to authorized users only.

chmod 755 /path/to/gaudi/files
chown root:root /path/to/gaudi/files

Implement strict access controls

all

Use security policies to restrict which users can access Gaudi software directories and executables.

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit which users have local access to affected systems
  • Monitor system logs for privilege escalation attempts and unauthorized file permission changes

🔍 How to Verify

Check if Vulnerable:

Check the installed Intel Gaudi software version. If version is below 1.18, the system is vulnerable.

Check Version:

Check Intel Gaudi software documentation or configuration files for version information. On Linux: check package manager or look for version files in installation directories.

Verify Fix Applied:

Verify that Intel Gaudi software version 1.18 or later is installed and check file permissions on Gaudi-related files.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful privilege escalation attempts
  • Unauthorized file permission changes
  • Access to Gaudi software files by non-privileged users

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic unless combined with other attacks

SIEM Query:

Search for events where non-admin users attempt to execute privileged operations or modify system files related to Intel Gaudi software.

🔗 References

📤 Share & Export