CVE-2024-45371: Denial of Service in Intel(R) Arc™ & Iris(R) Xe graphics software
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6077 may allow an authenticated user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2024-45371 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6077. The flaw arises from improper access control mechanisms within the graphics software, which can be exploited by an authenticated local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with limited privileges (low privileges) to cause the graphics driver or associated software components to become unresponsive or crash, thereby disrupting the availability of graphics processing capabilities on the affected system. The attack vector requires local access with authentication, meaning an attacker must already have some level of user access to the system. User interaction is also required to trigger the vulnerability. The CVSS 4.0 base score of 5.2 reflects these factors: low attack vector (local), low attack complexity, no need for elevated privileges beyond authenticated user, and no requirement for user interaction beyond the attacker’s own actions. The vulnerability does not impact confidentiality or integrity but primarily affects availability, potentially causing system instability or crashes related to graphics processing. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data, though it is expected that Intel will release or has released updates to address this issue in version 32.0.101.6077 or later. This vulnerability is relevant for systems using Intel Arc or Iris Xe graphics software, which are commonly found in modern laptops, desktops, and workstations that rely on Intel integrated or discrete graphics solutions.
Potential Impact
For European organizations, the primary impact of CVE-2024-45371 is the potential disruption of workstation and endpoint availability due to graphics driver crashes or instability. This can affect productivity, especially in sectors relying heavily on graphical applications such as design, engineering, media production, and scientific research. While the vulnerability does not allow data theft or system takeover, denial of service conditions can lead to operational downtime and increased support costs. In environments with shared or multi-user systems, an authenticated user could intentionally or accidentally cause service interruptions affecting other users. Additionally, organizations with strict uptime requirements or those using Intel graphics in critical infrastructure or industrial control systems may face operational risks. The requirement for local authenticated access limits remote exploitation risk, but insider threats or compromised user accounts could leverage this vulnerability. Given the widespread use of Intel graphics in European corporate and consumer devices, the vulnerability has a broad potential impact, though it is not a critical threat to confidentiality or integrity.
Mitigation Recommendations
To mitigate CVE-2024-45371, European organizations should: 1) Ensure all systems using Intel Arc or Iris Xe graphics software are updated to version 32.0.101.6077 or later, applying the latest Intel graphics driver updates as soon as they become available. 2) Implement strict access controls and user privilege management to minimize the number of users with authenticated local access, reducing the risk of exploitation by unauthorized or low-privilege users. 3) Monitor endpoint stability and logs for signs of graphics driver crashes or unusual behavior that could indicate exploitation attempts. 4) Educate users about the risks of running untrusted applications or scripts that might trigger the vulnerability. 5) In sensitive environments, consider isolating or restricting access to systems with Intel graphics drivers until patches are applied. 6) Employ endpoint detection and response (EDR) tools capable of detecting anomalous local activity related to graphics driver failures. These steps go beyond generic advice by focusing on controlling local access, timely patching, and monitoring for specific instability symptoms related to the graphics software.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2024-45371: Denial of Service in Intel(R) Arc™ & Iris(R) Xe graphics software
Description
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6077 may allow an authenticated user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2024-45371 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6077. The flaw arises from improper access control mechanisms within the graphics software, which can be exploited by an authenticated local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with limited privileges (low privileges) to cause the graphics driver or associated software components to become unresponsive or crash, thereby disrupting the availability of graphics processing capabilities on the affected system. The attack vector requires local access with authentication, meaning an attacker must already have some level of user access to the system. User interaction is also required to trigger the vulnerability. The CVSS 4.0 base score of 5.2 reflects these factors: low attack vector (local), low attack complexity, no need for elevated privileges beyond authenticated user, and no requirement for user interaction beyond the attacker’s own actions. The vulnerability does not impact confidentiality or integrity but primarily affects availability, potentially causing system instability or crashes related to graphics processing. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data, though it is expected that Intel will release or has released updates to address this issue in version 32.0.101.6077 or later. This vulnerability is relevant for systems using Intel Arc or Iris Xe graphics software, which are commonly found in modern laptops, desktops, and workstations that rely on Intel integrated or discrete graphics solutions.
Potential Impact
For European organizations, the primary impact of CVE-2024-45371 is the potential disruption of workstation and endpoint availability due to graphics driver crashes or instability. This can affect productivity, especially in sectors relying heavily on graphical applications such as design, engineering, media production, and scientific research. While the vulnerability does not allow data theft or system takeover, denial of service conditions can lead to operational downtime and increased support costs. In environments with shared or multi-user systems, an authenticated user could intentionally or accidentally cause service interruptions affecting other users. Additionally, organizations with strict uptime requirements or those using Intel graphics in critical infrastructure or industrial control systems may face operational risks. The requirement for local authenticated access limits remote exploitation risk, but insider threats or compromised user accounts could leverage this vulnerability. Given the widespread use of Intel graphics in European corporate and consumer devices, the vulnerability has a broad potential impact, though it is not a critical threat to confidentiality or integrity.
Mitigation Recommendations
To mitigate CVE-2024-45371, European organizations should: 1) Ensure all systems using Intel Arc or Iris Xe graphics software are updated to version 32.0.101.6077 or later, applying the latest Intel graphics driver updates as soon as they become available. 2) Implement strict access controls and user privilege management to minimize the number of users with authenticated local access, reducing the risk of exploitation by unauthorized or low-privilege users. 3) Monitor endpoint stability and logs for signs of graphics driver crashes or unusual behavior that could indicate exploitation attempts. 4) Educate users about the risks of running untrusted applications or scripts that might trigger the vulnerability. 5) In sensitive environments, consider isolating or restricting access to systems with Intel graphics drivers until patches are applied. 6) Employ endpoint detection and response (EDR) tools capable of detecting anomalous local activity related to graphics driver failures. These steps go beyond generic advice by focusing on controlling local access, timely patching, and monitoring for specific instability symptoms related to the graphics software.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2024-09-19T03:00:23.018Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecad7
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 4:26:18 PM
Last updated: 1/7/2026, 4:23:53 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.