Vulnerability identifier: #VU72129
Vulnerability risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: Yes
Vulnerable software:
iQVW32.SYS
Hardware solutions /
Drivers
iQVW64.SYS
Hardware solutions /
Drivers
Vendor: Intel
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the 0x80862013, 0x8086200B, 0x8086200F, and 0x80862007 IOCTL calls in the Intel Ethernet diagnostics driver for Windows. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild since December 2022 by Scattered Spider (aka Roasted 0ktapus or UNC3944).
Mitigation
Install updates from vendor's website.
Vulnerable software versions
iQVW32.SYS: before 1.3.1.0
iQVW64.SYS: before 1.3.1.0
External links
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html
https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.