A new vulnerability has been discovered in the Intel NUC Kit Wireless Adapter drivers for Windows 10 with the Common Vulnerabilities and Exposures (CVE) identifier CVE-2022-36377. This vulnerability is due to incorrect default permissions applied by the installer software on certain Intel NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40. It allows an authenticated user with local access to potentially enable an escalation of privilege, which opens up doors for additional exploits and cyber-attacks.

Original References

You can find the original advisory for this vulnerability on the Intel security website at the following link:

- Intel Security Advisory

Affected Products

The vulnerability affects Intel NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40. Specific NUC models impacted include:

Exploit Details

This vulnerability occurs due to the improper handling of default permissions by the installer software in the affected versions of Intel NUC Kit Wireless Adapter drivers. An authenticated user with local access to the system may be able to exploit this weakness in default permissions to escalate their privileges levels and perform unauthorized actions on the system.

To demonstrate the vulnerability, let's consider the following code snippet

#include <iostream>
#include <Windows.h>

int main()
{
  // Open vulnerable driver with incorrect default permissions
  HANDLE hDevice = CreateFile(L"\\\\.\\VulnerableDriver",
                              GENERIC_READ | GENERIC_WRITE,
                              FILE_SHARE_READ | FILE_SHARE_WRITE,
                              NULL,
                              OPEN_EXISTING,
                              ,
                              NULL);
  if (hDevice != INVALID_HANDLE_VALUE)
  {
    // Perform actions with the escalated privileges
    std::cout << "Exploit successful. Default permissions allow for privilege escalation." << std::endl;

    // Close the handle
    CloseHandle(hDevice);
  }
  else
  {
    std::cout << "Unable to open driver." << std::endl;
  }
  
  return ;
}


By leveraging incorrect default permissions, this exploit allows a seemingly benign action to be performed on the machine with escalated privileges, potentially leading to further unauthorized actions.

Recommendations

Intel has already released an updated version of the drivers to mitigate this vulnerability (version 22.40). Users are recommended to update their Intel NUC Kit Wireless Adapter drivers to the latest version to ensure they are protected from this issue. Visit the Intel website to download and install the updated drivers:

- Intel Driver Update

If you are unable to update the drivers immediately, it is advised to limit local system access and monitor system activity for any suspicious behavior.

Conclusion

The CVE-2022-36377 vulnerability is a reminder that even default settings and permissions applied by reputable vendors like Intel can be flawed, leading to potential security risks. Always stay up to date with security advisories and apply patches as soon as they are available to minimize the attack surface and protect your system from various cyber threats.

Timeline

Published on: 11/11/2022 16:15:00 UTC
Last modified on: 11/16/2022 16:27:00 UTC