CVE-2021-33105: denial of service in Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory
Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.
AI Analysis
Technical Summary
CVE-2021-33105 is a medium-severity vulnerability affecting certain Intel® Core™ processors integrated with Radeon™ RX Vega M GL graphics. The flaw is an out-of-bounds read condition (classified under CWE-125) present in the graphics subsystem firmware or driver before version 21.10. This vulnerability allows an authenticated local user to potentially cause information disclosure by reading memory outside the intended bounds. The vulnerability does not require user interaction beyond authentication, and it does not impact system integrity or availability directly. The CVSS 3.1 base score is 5.5, reflecting a moderate risk primarily due to the confidentiality impact. Exploitation requires local access with some privileges (low privileges) but no elevated privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability is specific to Intel Core processors with Radeon RX Vega M GL integrated graphics, which are typically found in certain mobile and compact desktop platforms. The root cause is an out-of-bounds read, which can lead to leakage of sensitive information from memory, potentially exposing data that should remain protected. Mitigation involves updating the graphics driver or firmware to version 21.10 or later, which patches the out-of-bounds read condition. Since the vulnerability requires local authenticated access, remote exploitation is not feasible, but insider threats or malware with local access could exploit it to escalate information disclosure capabilities.
Potential Impact
For European organizations, the primary impact of CVE-2021-33105 is the potential leakage of sensitive information from systems using affected Intel processors with Radeon RX Vega M GL graphics. This could include intellectual property, credentials, or other confidential data residing in memory. While the vulnerability does not allow code execution or denial of service, the confidentiality breach could facilitate further attacks or data exfiltration. Organizations with mobile workstations or compact desktops equipped with these processors—common in engineering, design, or research environments—may be at risk. The requirement for local authenticated access limits the threat to insiders or malware already present on the system, reducing the risk of widespread remote attacks. However, in high-security environments or regulated sectors (e.g., finance, healthcare, government) where data confidentiality is critical, even limited information disclosure can have serious consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value personnel or systems. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive data and where patch management can be enforced promptly.
Mitigation Recommendations
1. Update the graphics driver and firmware for Intel Core processors with Radeon RX Vega M GL graphics to version 21.10 or later as provided by Intel or system vendors. 2. Implement strict access controls and endpoint security measures to prevent unauthorized local access, including enforcing least privilege and strong authentication mechanisms. 3. Monitor systems for unusual local activity that could indicate exploitation attempts, such as unauthorized process execution or memory access patterns. 4. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block malicious local code that could exploit this vulnerability. 5. For organizations with mobile or remote workers, ensure secure VPN and endpoint security configurations to reduce risk of compromise leading to local exploitation. 6. Maintain an up-to-date asset inventory to identify systems with affected processors and prioritize patching accordingly. 7. Educate users about the risks of local malware and the importance of reporting suspicious activity promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2021-33105: denial of service in Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory
Description
Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.
AI-Powered Analysis
Technical Analysis
CVE-2021-33105 is a medium-severity vulnerability affecting certain Intel® Core™ processors integrated with Radeon™ RX Vega M GL graphics. The flaw is an out-of-bounds read condition (classified under CWE-125) present in the graphics subsystem firmware or driver before version 21.10. This vulnerability allows an authenticated local user to potentially cause information disclosure by reading memory outside the intended bounds. The vulnerability does not require user interaction beyond authentication, and it does not impact system integrity or availability directly. The CVSS 3.1 base score is 5.5, reflecting a moderate risk primarily due to the confidentiality impact. Exploitation requires local access with some privileges (low privileges) but no elevated privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability is specific to Intel Core processors with Radeon RX Vega M GL integrated graphics, which are typically found in certain mobile and compact desktop platforms. The root cause is an out-of-bounds read, which can lead to leakage of sensitive information from memory, potentially exposing data that should remain protected. Mitigation involves updating the graphics driver or firmware to version 21.10 or later, which patches the out-of-bounds read condition. Since the vulnerability requires local authenticated access, remote exploitation is not feasible, but insider threats or malware with local access could exploit it to escalate information disclosure capabilities.
Potential Impact
For European organizations, the primary impact of CVE-2021-33105 is the potential leakage of sensitive information from systems using affected Intel processors with Radeon RX Vega M GL graphics. This could include intellectual property, credentials, or other confidential data residing in memory. While the vulnerability does not allow code execution or denial of service, the confidentiality breach could facilitate further attacks or data exfiltration. Organizations with mobile workstations or compact desktops equipped with these processors—common in engineering, design, or research environments—may be at risk. The requirement for local authenticated access limits the threat to insiders or malware already present on the system, reducing the risk of widespread remote attacks. However, in high-security environments or regulated sectors (e.g., finance, healthcare, government) where data confidentiality is critical, even limited information disclosure can have serious consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value personnel or systems. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive data and where patch management can be enforced promptly.
Mitigation Recommendations
1. Update the graphics driver and firmware for Intel Core processors with Radeon RX Vega M GL graphics to version 21.10 or later as provided by Intel or system vendors. 2. Implement strict access controls and endpoint security measures to prevent unauthorized local access, including enforcing least privilege and strong authentication mechanisms. 3. Monitor systems for unusual local activity that could indicate exploitation attempts, such as unauthorized process execution or memory access patterns. 4. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block malicious local code that could exploit this vulnerability. 5. For organizations with mobile or remote workers, ensure secure VPN and endpoint security configurations to reduce risk of compromise leading to local exploitation. 6. Maintain an up-to-date asset inventory to identify systems with affected processors and prioritize patching accordingly. 7. Educate users about the risks of local malware and the importance of reporting suspicious activity promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2021-05-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbad2
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:12:44 PM
Last updated: 7/28/2025, 6:12:59 PM
Views: 12
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.