CVE-2024-45371: Denial of Service in Intel(R) Arc™ & Iris(R) Xe graphics software
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6077 may allow an authenticated user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2024-45371 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6077. The flaw arises from improper access control mechanisms within the graphics software, which can be exploited by an authenticated local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with limited privileges (low privileges) to cause the graphics driver or associated software components to become unresponsive or crash, thereby disrupting the availability of graphics processing capabilities on the affected system. The attack vector requires local access with authentication, meaning an attacker must already have some level of user access to the system. User interaction is also required to trigger the vulnerability. The CVSS 4.0 base score of 5.2 reflects these factors: low attack vector (local), low attack complexity, no need for elevated privileges beyond authenticated user, and no requirement for user interaction beyond the attacker’s own actions. The vulnerability does not impact confidentiality or integrity but primarily affects availability, potentially causing system instability or crashes related to graphics processing. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data, though it is expected that Intel will release or has released updates to address this issue in version 32.0.101.6077 or later. This vulnerability is relevant for systems using Intel Arc or Iris Xe graphics software, which are commonly found in modern laptops, desktops, and workstations that rely on Intel integrated or discrete graphics solutions.
Potential Impact
For European organizations, the primary impact of CVE-2024-45371 is the potential disruption of workstation and endpoint availability due to graphics driver crashes or instability. This can affect productivity, especially in sectors relying heavily on graphical applications such as design, engineering, media production, and scientific research. While the vulnerability does not allow data theft or system takeover, denial of service conditions can lead to operational downtime and increased support costs. In environments with shared or multi-user systems, an authenticated user could intentionally or accidentally cause service interruptions affecting other users. Additionally, organizations with strict uptime requirements or those using Intel graphics in critical infrastructure or industrial control systems may face operational risks. The requirement for local authenticated access limits remote exploitation risk, but insider threats or compromised user accounts could leverage this vulnerability. Given the widespread use of Intel graphics in European corporate and consumer devices, the vulnerability has a broad potential impact, though it is not a critical threat to confidentiality or integrity.
Mitigation Recommendations
To mitigate CVE-2024-45371, European organizations should: 1) Ensure all systems using Intel Arc or Iris Xe graphics software are updated to version 32.0.101.6077 or later, applying the latest Intel graphics driver updates as soon as they become available. 2) Implement strict access controls and user privilege management to minimize the number of users with authenticated local access, reducing the risk of exploitation by unauthorized or low-privilege users. 3) Monitor endpoint stability and logs for signs of graphics driver crashes or unusual behavior that could indicate exploitation attempts. 4) Educate users about the risks of running untrusted applications or scripts that might trigger the vulnerability. 5) In sensitive environments, consider isolating or restricting access to systems with Intel graphics drivers until patches are applied. 6) Employ endpoint detection and response (EDR) tools capable of detecting anomalous local activity related to graphics driver failures. These steps go beyond generic advice by focusing on controlling local access, timely patching, and monitoring for specific instability symptoms related to the graphics software.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2024-45371: Denial of Service in Intel(R) Arc™ & Iris(R) Xe graphics software
Description
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6077 may allow an authenticated user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2024-45371 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6077. The flaw arises from improper access control mechanisms within the graphics software, which can be exploited by an authenticated local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with limited privileges (low privileges) to cause the graphics driver or associated software components to become unresponsive or crash, thereby disrupting the availability of graphics processing capabilities on the affected system. The attack vector requires local access with authentication, meaning an attacker must already have some level of user access to the system. User interaction is also required to trigger the vulnerability. The CVSS 4.0 base score of 5.2 reflects these factors: low attack vector (local), low attack complexity, no need for elevated privileges beyond authenticated user, and no requirement for user interaction beyond the attacker’s own actions. The vulnerability does not impact confidentiality or integrity but primarily affects availability, potentially causing system instability or crashes related to graphics processing. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data, though it is expected that Intel will release or has released updates to address this issue in version 32.0.101.6077 or later. This vulnerability is relevant for systems using Intel Arc or Iris Xe graphics software, which are commonly found in modern laptops, desktops, and workstations that rely on Intel integrated or discrete graphics solutions.
Potential Impact
For European organizations, the primary impact of CVE-2024-45371 is the potential disruption of workstation and endpoint availability due to graphics driver crashes or instability. This can affect productivity, especially in sectors relying heavily on graphical applications such as design, engineering, media production, and scientific research. While the vulnerability does not allow data theft or system takeover, denial of service conditions can lead to operational downtime and increased support costs. In environments with shared or multi-user systems, an authenticated user could intentionally or accidentally cause service interruptions affecting other users. Additionally, organizations with strict uptime requirements or those using Intel graphics in critical infrastructure or industrial control systems may face operational risks. The requirement for local authenticated access limits remote exploitation risk, but insider threats or compromised user accounts could leverage this vulnerability. Given the widespread use of Intel graphics in European corporate and consumer devices, the vulnerability has a broad potential impact, though it is not a critical threat to confidentiality or integrity.
Mitigation Recommendations
To mitigate CVE-2024-45371, European organizations should: 1) Ensure all systems using Intel Arc or Iris Xe graphics software are updated to version 32.0.101.6077 or later, applying the latest Intel graphics driver updates as soon as they become available. 2) Implement strict access controls and user privilege management to minimize the number of users with authenticated local access, reducing the risk of exploitation by unauthorized or low-privilege users. 3) Monitor endpoint stability and logs for signs of graphics driver crashes or unusual behavior that could indicate exploitation attempts. 4) Educate users about the risks of running untrusted applications or scripts that might trigger the vulnerability. 5) In sensitive environments, consider isolating or restricting access to systems with Intel graphics drivers until patches are applied. 6) Employ endpoint detection and response (EDR) tools capable of detecting anomalous local activity related to graphics driver failures. These steps go beyond generic advice by focusing on controlling local access, timely patching, and monitoring for specific instability symptoms related to the graphics software.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2024-09-19T03:00:23.018Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecad7
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 4:26:18 PM
Last updated: 11/22/2025, 4:47:41 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.