Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37355: Escalation of Privilege in Intel(R) Graphics software

0
High
VulnerabilityCVE-2024-37355cvecve-2024-37355
Published: Wed Feb 12 2025 (02/12/2025, 21:18:47 UTC)
Source: CVE Database V5
Product: Intel(R) Graphics software

Description

CVE-2024-37355 is a high-severity vulnerability in Intel(R) Graphics software that allows an authenticated local user with limited privileges to escalate their privileges due to improper access control. Exploitation requires local access and no user interaction, potentially granting higher system privileges and compromising confidentiality, integrity, and availability of affected systems. There are no known exploits in the wild yet, but the vulnerability affects multiple versions of Intel Graphics software. Organizations using Intel Graphics components should prioritize patching once updates are available. The vulnerability is particularly relevant for environments with Intel-based systems, including enterprise desktops and laptops. Mitigation involves applying vendor patches, restricting local user permissions, and monitoring for unusual privilege escalations. Countries with significant Intel hardware deployment and critical infrastructure relying on Intel platforms are at higher risk. Given the CVSS 8. 5 score, this vulnerability demands urgent attention to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:31:39 UTC

Technical Analysis

CVE-2024-37355 is an escalation of privilege vulnerability found in Intel(R) Graphics software, caused by improper access control mechanisms within the software. The flaw allows an authenticated user with local access and limited privileges to elevate their privileges on the affected system. This vulnerability does not require user interaction and can be exploited with low attack complexity, making it a significant risk in environments where users have local access but should not have elevated permissions. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing unauthorized access to sensitive data, modification of system settings, or disruption of system operations. The affected product is Intel Graphics software, which is widely deployed across many Intel-based computing platforms globally. Although no known exploits have been reported in the wild, the high CVSS score (8.5) reflects the severity and potential impact of this vulnerability. The vulnerability was reserved in August 2024 and published in February 2025, indicating recent discovery and disclosure. Due to the nature of the flaw, attackers with local access could leverage this to gain administrative privileges, bypassing security controls and potentially compromising entire systems or networks.

Potential Impact

The impact of CVE-2024-37355 is significant for organizations worldwide using Intel Graphics software on their systems. Successful exploitation allows attackers with local access to escalate privileges, potentially gaining administrative or SYSTEM-level control. This can lead to unauthorized access to sensitive information, installation of persistent malware, disabling of security controls, and disruption of critical services. Enterprises with large deployments of Intel-based desktops and laptops, especially those in regulated industries such as finance, healthcare, and government, face increased risk of data breaches and operational disruptions. The vulnerability also poses a threat to cloud service providers and data centers utilizing Intel hardware, as compromised hosts could affect multi-tenant environments. Since exploitation requires local access, organizations with weak endpoint security or shared user environments are particularly vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this flaw to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2024-37355, organizations should implement the following specific measures: 1) Monitor Intel's official security advisories closely and apply patches or updates to Intel Graphics software immediately upon release. 2) Restrict local user permissions rigorously, ensuring users have only the minimum necessary privileges to perform their tasks. 3) Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or suspicious local activity. 4) Harden system configurations by disabling unnecessary services and enforcing strict access controls on graphics driver components and related software. 5) Conduct regular security audits and vulnerability assessments focusing on local privilege escalation vectors. 6) Educate users about the risks of local privilege escalation and enforce policies to prevent unauthorized software installation or execution. 7) In high-security environments, consider isolating critical systems or using virtualization/containerization to limit the impact of potential exploits. These targeted actions go beyond generic advice by focusing on controlling local access and monitoring privilege changes specific to Intel Graphics software components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2024-08-15T03:00:10.661Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a43d85912abc71d62495

Added to database: 2/26/2026, 7:51:25 PM

Last enriched: 2/26/2026, 9:31:39 PM

Last updated: 2/26/2026, 10:35:08 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses