Skip to main content

CVE-2021-33105: denial of service in Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory

Medium
VulnerabilityCVE-2021-33105cvecve-2021-33105
Published: Wed Feb 09 2022 (02/09/2022, 22:04:39 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory

Description

Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:12:44 UTC

Technical Analysis

CVE-2021-33105 is a medium-severity vulnerability affecting certain Intel® Core™ processors integrated with Radeon™ RX Vega M GL graphics. The flaw is an out-of-bounds read condition (classified under CWE-125) present in the graphics subsystem firmware or driver before version 21.10. This vulnerability allows an authenticated local user to potentially cause information disclosure by reading memory outside the intended bounds. The vulnerability does not require user interaction beyond authentication, and it does not impact system integrity or availability directly. The CVSS 3.1 base score is 5.5, reflecting a moderate risk primarily due to the confidentiality impact. Exploitation requires local access with some privileges (low privileges) but no elevated privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability is specific to Intel Core processors with Radeon RX Vega M GL integrated graphics, which are typically found in certain mobile and compact desktop platforms. The root cause is an out-of-bounds read, which can lead to leakage of sensitive information from memory, potentially exposing data that should remain protected. Mitigation involves updating the graphics driver or firmware to version 21.10 or later, which patches the out-of-bounds read condition. Since the vulnerability requires local authenticated access, remote exploitation is not feasible, but insider threats or malware with local access could exploit it to escalate information disclosure capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2021-33105 is the potential leakage of sensitive information from systems using affected Intel processors with Radeon RX Vega M GL graphics. This could include intellectual property, credentials, or other confidential data residing in memory. While the vulnerability does not allow code execution or denial of service, the confidentiality breach could facilitate further attacks or data exfiltration. Organizations with mobile workstations or compact desktops equipped with these processors—common in engineering, design, or research environments—may be at risk. The requirement for local authenticated access limits the threat to insiders or malware already present on the system, reducing the risk of widespread remote attacks. However, in high-security environments or regulated sectors (e.g., finance, healthcare, government) where data confidentiality is critical, even limited information disclosure can have serious consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value personnel or systems. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive data and where patch management can be enforced promptly.

Mitigation Recommendations

1. Update the graphics driver and firmware for Intel Core processors with Radeon RX Vega M GL graphics to version 21.10 or later as provided by Intel or system vendors. 2. Implement strict access controls and endpoint security measures to prevent unauthorized local access, including enforcing least privilege and strong authentication mechanisms. 3. Monitor systems for unusual local activity that could indicate exploitation attempts, such as unauthorized process execution or memory access patterns. 4. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block malicious local code that could exploit this vulnerability. 5. For organizations with mobile or remote workers, ensure secure VPN and endpoint security configurations to reduce risk of compromise leading to local exploitation. 6. Maintain an up-to-date asset inventory to identify systems with affected processors and prioritize patching accordingly. 7. Educate users about the risks of local malware and the importance of reporting suspicious activity promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbad2

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:12:44 PM

Last updated: 7/28/2025, 6:12:59 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats