CVE-2025-24327

6.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Rapid Storage Technology Application allows local authenticated attackers to escalate privileges through insecure inherited permissions. Attackers could execute arbitrary code with elevated privileges, affecting systems running vulnerable versions of the software. The attack requires local access and user interaction, making it primarily a threat to workstations and servers with the vulnerable software installed.

💻 Affected Systems

Products:
  • Intel Rapid Storage Technology Application
Versions: All versions before 20.0.1021
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel RST software to be installed and running. Typically affects systems with Intel storage controllers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via local privilege escalation leading to full administrative control, data theft, and persistent backdoor installation.

🟠

Likely Case

Local authenticated attacker gains elevated privileges to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

Limited impact due to proper access controls, user awareness, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - Requires local access and authenticated user interaction, not directly exploitable over network.
🏢 Internal Only: HIGH - Significant risk from insider threats or compromised internal accounts with local access to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires authenticated user, local access, and user interaction. Attack complexity is high according to CVSS metrics.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.0.1021 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01362.html

Restart Required: Yes

Instructions:

1. Download Intel RST version 20.0.1021 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Remove Intel RST Software

windows

Uninstall Intel Rapid Storage Technology if not required for system functionality

Control Panel > Programs > Uninstall a program > Select Intel Rapid Storage Technology > Uninstall

Restrict Local Access

all

Implement strict local access controls and limit user privileges

🧯 If You Can't Patch

  • Implement principle of least privilege for all user accounts
  • Enable application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Intel RST version in Control Panel > Programs or via 'wmic product get name,version' command

Check Version:

wmic product where "name like '%Intel%Rapid%Storage%'" get name,version

Verify Fix Applied:

Verify installed version is 20.0.1021 or later using same methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Intel RST components
  • Permission modification events related to RST files/folders

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

Process Creation where (Image contains 'RST' OR ParentImage contains 'RST') AND (IntegrityLevel changed OR User contains 'SYSTEM')

🔗 References

📤 Share & Export