Intel patches MiTM flaw in its Driver Update Utility

Intel has fixed a remotely exploitable vulnerability (CVE-2016-1493) in the Intel Driver Update Utility which could be used by a man-in-the-middle attacker to corrupt transferred data, which could lead to information leak and ultimately even code execution.

The Intel Driver Update Utility is a tool that analyzes the system drivers on the user’s computer. The Utility reports if any new drivers for Intel components (integrated graphics controllers, audio devices, wireless products, Ethernet network add-in adapters, etc.) are available, and provides the option to automatically install them.

Versions 2.0 through 2.3 of the Utility are affected, and the update (v2.4 and later) mitigates the use of a non-SSL URL for the download, which allowed cleartext transmission of sensitive information (update information).

The flaw was discovered by the Core Security Research Team. More technical details about it can be found in this advisory, along with PoC code.