Skip to main content

CVE-2024-46895: Escalation of Privilege in Intel(R) Arc™ & Iris(R) Xe graphics software

Medium
VulnerabilityCVE-2024-46895cvecve-2024-46895
Published: Tue May 13 2025 (05/13/2025, 21:03:16 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Arc™ & Iris(R) Xe graphics software

Description

Uncontrolled search path for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6083/32.0.101.5736 may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 12:27:03 UTC

Technical Analysis

CVE-2024-46895 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6083/32.0.101.5736. The vulnerability arises from an uncontrolled search path issue within the graphics software, which can be exploited by an authenticated user with local access to escalate their privileges on the affected system. Specifically, the uncontrolled search path means that the software may load malicious or unintended components from directories that are not securely controlled, allowing an attacker to execute code with elevated privileges. The vulnerability requires the attacker to have at least low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:H/AT:P/PR:L/UI:A). The impact on confidentiality, integrity, and availability is high, meaning that successful exploitation could allow the attacker to gain significant control over the system, potentially leading to unauthorized access to sensitive data or disruption of system operations. However, the attack complexity is high, and the attacker must be authenticated and interact with the system, which limits the ease of exploitation and scope. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source information, though it is implied that updating to versions 32.0.101.6083 or later would remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Intel Arc or Iris Xe graphics software is deployed, such as workstations, laptops, or servers using these GPUs for graphics acceleration or compute tasks. Successful exploitation could allow an attacker with limited access to escalate privileges, potentially leading to broader system compromise, data breaches, or disruption of critical business operations. This risk is particularly relevant for sectors with high-value intellectual property or sensitive data, such as finance, healthcare, government, and critical infrastructure. The requirement for local authenticated access reduces the risk of remote exploitation but does not eliminate insider threats or attacks leveraging compromised user accounts. Additionally, organizations with bring-your-own-device (BYOD) policies or remote work setups may face increased exposure if endpoint devices are not properly secured or updated.

Mitigation Recommendations

European organizations should prioritize updating Intel Arc and Iris Xe graphics software to version 32.0.101.6083 or later as soon as updates become available from Intel. Until patches are applied, organizations should enforce strict access controls to limit local user privileges and reduce the number of users with authenticated access to systems running the affected software. Implementing application whitelisting and monitoring for unusual DLL or component loading behavior can help detect exploitation attempts related to uncontrolled search paths. Endpoint detection and response (EDR) solutions should be tuned to alert on suspicious privilege escalation activities. Additionally, organizations should conduct regular audits of user privileges and ensure that users operate with the least privilege necessary. Security awareness training should emphasize the risks of local privilege escalation and the importance of reporting suspicious system behavior. Network segmentation and endpoint hardening can further reduce the impact of a successful local attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-09-19T03:00:22.946Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec792

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 12:27:03 PM

Last updated: 8/8/2025, 8:25:13 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats