Skip to main content

CVE-2024-45333: Denial of Service in Intel(R) Data Center GPU Flex Series for Windows driver

Medium
VulnerabilityCVE-2024-45333cvecve-2024-45333
Published: Tue May 13 2025 (05/13/2025, 21:03:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Data Center GPU Flex Series for Windows driver

Description

Improper access control for some Intel(R) Data Center GPU Flex Series for Windows driver before version 31.0.101.4314 may allow an authenticated user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:25:09 UTC

Technical Analysis

CVE-2024-45333 is a medium-severity vulnerability affecting the Intel(R) Data Center GPU Flex Series for Windows driver versions prior to 31.0.101.4314. The issue arises from improper access control within the driver, which allows an authenticated local user to potentially cause a denial of service (DoS) condition. Specifically, the vulnerability can be exploited by a user with limited privileges (low privileges) on the affected system to disrupt the normal operation of the GPU driver, leading to service interruption or system instability. The attack vector requires local access, meaning the attacker must have some form of authenticated presence on the machine, but no user interaction is necessary once access is obtained. The CVSS 4.0 score of 6.9 reflects a medium severity rating, with the main impact being availability degradation (denial of service). The vulnerability does not affect confidentiality or integrity, and exploitation does not require elevated privileges beyond authenticated local access. No known exploits are currently reported in the wild, and no public patches or mitigation links were provided at the time of publication. This vulnerability is relevant in environments where Intel Data Center GPU Flex Series hardware is deployed with Windows drivers, particularly in data centers or cloud infrastructures leveraging these GPUs for compute workloads.

Potential Impact

For European organizations, the primary impact of CVE-2024-45333 is the potential disruption of critical compute workloads that rely on Intel Data Center GPU Flex Series hardware. This could affect cloud service providers, research institutions, financial services, and enterprises using GPU acceleration for AI, machine learning, or high-performance computing tasks. A denial of service could lead to temporary loss of availability of GPU resources, impacting business continuity and operational efficiency. While the vulnerability does not allow data theft or system takeover, the interruption of GPU services could delay time-sensitive computations or degrade service quality. Organizations with multi-tenant environments or shared infrastructure may face increased risk if a malicious insider or compromised user account exploits this flaw. Given the local access requirement, the threat is more relevant to internal threat actors or attackers who have already gained foothold in the network. The absence of known exploits limits immediate risk, but the medium severity rating warrants timely remediation to prevent potential escalation or chaining with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2024-45333, European organizations should: 1) Apply the updated Intel driver version 31.0.101.4314 or later as soon as it becomes available to ensure the access control flaw is corrected. 2) Restrict local access to systems running the affected GPU drivers by enforcing strict user account management, including least privilege principles and robust authentication mechanisms. 3) Monitor and audit local user activities on GPU-enabled servers to detect unusual behavior that could indicate exploitation attempts. 4) Implement network segmentation and isolation for critical GPU compute nodes to limit exposure to unauthorized users. 5) Employ endpoint detection and response (EDR) solutions capable of identifying anomalous driver or GPU-related activities. 6) Educate system administrators and security teams about this vulnerability to ensure rapid response and patch deployment. 7) If patching is delayed, consider temporarily disabling or limiting access to the Intel Data Center GPU Flex Series drivers where feasible to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-09-26T03:00:15.805Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecacf

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:25:09 PM

Last updated: 7/28/2025, 10:32:56 PM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats