Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47800: Escalation of Privilege in Intel(R) Graphics Driver software

0
Medium
VulnerabilityCVE-2024-47800cvecve-2024-47800
Published: Tue May 13 2025 (05/13/2025, 21:03:21 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Graphics Driver software

Description

Uncontrolled search path for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:24:24 UTC

Technical Analysis

CVE-2024-47800 is a vulnerability identified in Intel Graphics Driver software involving an uncontrolled search path, which can be exploited by an authenticated local user to escalate privileges. The flaw arises because the driver software improperly handles the search path for certain components or libraries, allowing an attacker with limited privileges to influence the loading of malicious code or components. This can lead to execution of code with elevated privileges, compromising system integrity and potentially allowing further malicious activities. The vulnerability requires local access and user interaction, with a high attack complexity, meaning exploitation is non-trivial and requires specific conditions. The CVSS 4.0 score of 5.4 reflects a medium severity, considering the partial privileges required and the need for user interaction. The vulnerability affects multiple versions of Intel Graphics Driver software, though exact versions are not specified here. No public exploits are known at this time, but the flaw represents a significant risk in environments where local user accounts are shared or insufficiently controlled. The vulnerability does not affect the system remotely, limiting its attack surface to local threat actors or malware that has already gained some foothold.

Potential Impact

The primary impact of CVE-2024-47800 is the potential for privilege escalation on affected systems, which can undermine system security by allowing attackers to gain higher-level access than intended. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of system operations. Organizations with multiple users on shared systems or environments where local access is not tightly controlled are at higher risk. The vulnerability affects the confidentiality, integrity, and availability of systems running Intel Graphics Drivers. While remote exploitation is not possible, the risk from insider threats, compromised user accounts, or malware that achieves initial local access is significant. This can be particularly damaging in enterprise environments, government agencies, and critical infrastructure sectors where Intel hardware is prevalent. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation once details become widely known.

Mitigation Recommendations

To mitigate CVE-2024-47800, organizations should: 1) Monitor Intel's official channels for security patches and apply updates to Intel Graphics Driver software promptly once available. 2) Restrict local user permissions to the minimum necessary, avoiding granting unnecessary privileges that could facilitate exploitation. 3) Implement strict access controls and auditing on systems with Intel graphics hardware to detect and prevent unauthorized local access. 4) Employ application whitelisting and integrity checking to prevent unauthorized code execution via manipulated search paths. 5) Educate users about the risks of executing untrusted code or interacting with suspicious prompts, as user interaction is required for exploitation. 6) Use endpoint detection and response (EDR) solutions to identify suspicious local activities that may indicate exploitation attempts. 7) Consider isolating critical systems or sensitive environments to reduce the risk of local privilege escalation attacks. These measures, combined with timely patching, will reduce the likelihood and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-10-09T02:59:22.126Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec796

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:24:24 PM

Last updated: 3/26/2026, 8:37:27 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses