Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-33105: denial of service in Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory

0
Medium
VulnerabilityCVE-2021-33105cvecve-2021-33105
Published: Wed Feb 09 2022 (02/09/2022, 22:04:39 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory

Description

Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:12:44 UTC

Technical Analysis

CVE-2021-33105 is a medium-severity vulnerability affecting certain Intel® Core™ processors integrated with Radeon™ RX Vega M GL graphics. The flaw is an out-of-bounds read condition (classified under CWE-125) present in the graphics subsystem firmware or driver before version 21.10. This vulnerability allows an authenticated local user to potentially cause information disclosure by reading memory outside the intended bounds. The vulnerability does not require user interaction beyond authentication, and it does not impact system integrity or availability directly. The CVSS 3.1 base score is 5.5, reflecting a moderate risk primarily due to the confidentiality impact. Exploitation requires local access with some privileges (low privileges) but no elevated privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability is specific to Intel Core processors with Radeon RX Vega M GL integrated graphics, which are typically found in certain mobile and compact desktop platforms. The root cause is an out-of-bounds read, which can lead to leakage of sensitive information from memory, potentially exposing data that should remain protected. Mitigation involves updating the graphics driver or firmware to version 21.10 or later, which patches the out-of-bounds read condition. Since the vulnerability requires local authenticated access, remote exploitation is not feasible, but insider threats or malware with local access could exploit it to escalate information disclosure capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2021-33105 is the potential leakage of sensitive information from systems using affected Intel processors with Radeon RX Vega M GL graphics. This could include intellectual property, credentials, or other confidential data residing in memory. While the vulnerability does not allow code execution or denial of service, the confidentiality breach could facilitate further attacks or data exfiltration. Organizations with mobile workstations or compact desktops equipped with these processors—common in engineering, design, or research environments—may be at risk. The requirement for local authenticated access limits the threat to insiders or malware already present on the system, reducing the risk of widespread remote attacks. However, in high-security environments or regulated sectors (e.g., finance, healthcare, government) where data confidentiality is critical, even limited information disclosure can have serious consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value personnel or systems. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive data and where patch management can be enforced promptly.

Mitigation Recommendations

1. Update the graphics driver and firmware for Intel Core processors with Radeon RX Vega M GL graphics to version 21.10 or later as provided by Intel or system vendors. 2. Implement strict access controls and endpoint security measures to prevent unauthorized local access, including enforcing least privilege and strong authentication mechanisms. 3. Monitor systems for unusual local activity that could indicate exploitation attempts, such as unauthorized process execution or memory access patterns. 4. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block malicious local code that could exploit this vulnerability. 5. For organizations with mobile or remote workers, ensure secure VPN and endpoint security configurations to reduce risk of compromise leading to local exploitation. 6. Maintain an up-to-date asset inventory to identify systems with affected processors and prioritize patching accordingly. 7. Educate users about the risks of local malware and the importance of reporting suspicious activity promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbad2

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:12:44 PM

Last updated: 2/7/2026, 7:41:15 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats