CVE Vulnerabilities

CVE-2022-41687

Incorrect Default Permissions

Published: May 10, 2023 | Modified: Nov 07, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Insecure inherited permissions in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access.

Weakness

During installation, installed file permissions are set to allow anyone to modify those files.

Affected Software

Name Vendor Start Version End Version
Windows_10_1507 Microsoft - (including) - (including)
Windows_10_1511 Microsoft - (including) - (including)
Windows_10_1607 Microsoft - (including) - (including)
Windows_10_1703 Microsoft - (including) - (including)
Windows_10_1709 Microsoft - (including) - (including)
Windows_10_1803 Microsoft - (including) - (including)
Windows_10_1809 Microsoft - (including) - (including)
Windows_10_1903 Microsoft - (including) - (including)
Windows_10_1909 Microsoft - (including) - (including)
Windows_10_2004 Microsoft - (including) - (including)
Windows_10_20h2 Microsoft - (including) - (including)
Windows_10_21h1 Microsoft - (including) - (including)
Windows_10_21h2 Microsoft - (including) - (including)
Windows_10_22h2 Microsoft - (including) - (including)

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References