Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46895: Escalation of Privilege in Intel(R) Arc™ & Iris(R) Xe graphics software

0
Medium
VulnerabilityCVE-2024-46895cvecve-2024-46895
Published: Tue May 13 2025 (05/13/2025, 21:03:16 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Arc™ & Iris(R) Xe graphics software

Description

Uncontrolled search path for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6083/32.0.101.5736 may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 12:27:03 UTC

Technical Analysis

CVE-2024-46895 is a medium-severity vulnerability affecting Intel(R) Arc™ and Iris(R) Xe graphics software versions prior to 32.0.101.6083/32.0.101.5736. The vulnerability arises from an uncontrolled search path issue within the graphics software, which can be exploited by an authenticated user with local access to escalate their privileges on the affected system. Specifically, the uncontrolled search path means that the software may load malicious or unintended components from directories that are not securely controlled, allowing an attacker to execute code with elevated privileges. The vulnerability requires the attacker to have at least low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:H/AT:P/PR:L/UI:A). The impact on confidentiality, integrity, and availability is high, meaning that successful exploitation could allow the attacker to gain significant control over the system, potentially leading to unauthorized access to sensitive data or disruption of system operations. However, the attack complexity is high, and the attacker must be authenticated and interact with the system, which limits the ease of exploitation and scope. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source information, though it is implied that updating to versions 32.0.101.6083 or later would remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Intel Arc or Iris Xe graphics software is deployed, such as workstations, laptops, or servers using these GPUs for graphics acceleration or compute tasks. Successful exploitation could allow an attacker with limited access to escalate privileges, potentially leading to broader system compromise, data breaches, or disruption of critical business operations. This risk is particularly relevant for sectors with high-value intellectual property or sensitive data, such as finance, healthcare, government, and critical infrastructure. The requirement for local authenticated access reduces the risk of remote exploitation but does not eliminate insider threats or attacks leveraging compromised user accounts. Additionally, organizations with bring-your-own-device (BYOD) policies or remote work setups may face increased exposure if endpoint devices are not properly secured or updated.

Mitigation Recommendations

European organizations should prioritize updating Intel Arc and Iris Xe graphics software to version 32.0.101.6083 or later as soon as updates become available from Intel. Until patches are applied, organizations should enforce strict access controls to limit local user privileges and reduce the number of users with authenticated access to systems running the affected software. Implementing application whitelisting and monitoring for unusual DLL or component loading behavior can help detect exploitation attempts related to uncontrolled search paths. Endpoint detection and response (EDR) solutions should be tuned to alert on suspicious privilege escalation activities. Additionally, organizations should conduct regular audits of user privileges and ensure that users operate with the least privilege necessary. Security awareness training should emphasize the risks of local privilege escalation and the importance of reporting suspicious system behavior. Network segmentation and endpoint hardening can further reduce the impact of a successful local attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-09-19T03:00:22.946Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec792

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 12:27:03 PM

Last updated: 11/22/2025, 4:47:44 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats