Skip to main content

CVE-2025-24835: Denial of Service in Intel(R) Arc(TM) B-Series graphics

Medium
VulnerabilityCVE-2025-24835cvecve-2025-24835
Published: Tue Aug 12 2025 (08/12/2025, 16:59:08 UTC)
Source: CVE Database V5
Product: Intel(R) Arc(TM) B-Series graphics

Description

Protection mechanism failure in the Intel(R) Graphics Driver for the Intel(R) Arc(TM) B-Series graphics before version 32.0.101.6737 may allow an authenticated user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:44:31 UTC

Technical Analysis

CVE-2025-24835 is a medium-severity vulnerability affecting Intel(R) Arc(TM) B-Series graphics drivers prior to version 32.0.101.6737. The issue stems from a failure in a protection mechanism within the Intel Graphics Driver, which can be exploited by an authenticated user with local access to cause a denial of service (DoS). Specifically, the vulnerability allows a user with limited privileges (low privileges) and requiring user interaction to trigger a state where the graphics driver or the associated hardware becomes unresponsive or crashes, disrupting normal graphics operations. The vulnerability does not affect confidentiality or integrity directly but impacts availability by potentially rendering the graphics subsystem unusable until a system restart or driver reload. The CVSS 4.1 score of 4.1 reflects the limited attack vector (local access), the need for user interaction, and the requirement for some privileges, which reduces the overall risk compared to remote or unauthenticated exploits. No known exploits are currently reported in the wild, and no patches are explicitly linked in the provided data, though updating to version 32.0.101.6737 or later is implied as a remediation step. This vulnerability is specific to Intel Arc B-Series graphics hardware and its associated drivers, which are relatively new discrete GPUs targeting consumer and professional markets, including laptops and desktops.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of workstation or server graphics capabilities, which could affect productivity, especially in environments relying on Intel Arc B-Series GPUs for graphical processing tasks such as CAD, media editing, or visualization. While the DoS does not lead to data breaches or corruption, repeated or targeted exploitation could cause operational downtime or user frustration. In sectors where graphics performance is critical (e.g., design firms, media companies, engineering departments), this could translate into measurable productivity losses. Since exploitation requires local authenticated access and user interaction, the risk is higher in environments where endpoint security is lax or where users might be tricked into triggering the vulnerability. The vulnerability is less likely to impact cloud or headless server environments unless Intel Arc B-Series GPUs are deployed there. Overall, the impact is moderate but should not be ignored, especially in organizations with a significant deployment of affected Intel graphics hardware.

Mitigation Recommendations

1. Update the Intel Graphics Driver to version 32.0.101.6737 or later as soon as possible to remediate the vulnerability. 2. Enforce strict endpoint security policies to limit local user privileges and reduce the risk of unauthorized or accidental exploitation. 3. Implement user awareness training to prevent inadvertent triggering of the vulnerability via social engineering or unsafe user actions. 4. Monitor systems with Intel Arc B-Series GPUs for unusual graphics driver crashes or system instability that could indicate attempted exploitation. 5. Use application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious activities related to graphics driver manipulation. 6. For critical environments, consider isolating systems with Intel Arc GPUs or restricting access to trusted users only. 7. Maintain up-to-date inventories of hardware and drivers to quickly identify affected systems and prioritize patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-03-11T03:00:20.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad00349346

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:44:31 AM

Last updated: 8/20/2025, 1:44:31 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats