CVE-2025-32091: Escalation of Privilege in Intel(R) Arc(TM) B-series GPUs
Incorrect default permissions in some firmware for the Intel(R) Arc(TM) B-series GPUs within Ring 1: Device Drivers may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI Analysis
Technical Summary
CVE-2025-32091 is a vulnerability identified in the firmware of Intel Arc B-series GPUs, specifically within the Ring 1 device drivers. The root cause is incorrect default permissions set in the GPU firmware, which allows a system software adversary with privileged user access to escalate their privileges further. The attack complexity is low, and no user interaction is required, making the vulnerability easier to exploit once local privileged access is obtained. The vulnerability affects the confidentiality, integrity, and availability of the system at a high level, potentially allowing an attacker to gain unauthorized control over GPU operations or the host system. The vulnerability does not require special internal knowledge, which broadens the potential attacker base to any privileged user on the system. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no attack prerequisites (AT:N), requires privileged access (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to systems using affected Intel Arc B-series GPUs. The affected versions are not explicitly listed but are referenced in Intel advisories. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure. The lack of patch links suggests that mitigations or firmware updates may still be pending or in development.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in sectors relying on Intel Arc B-series GPUs for compute-intensive tasks such as research, engineering, and graphics processing. The ability for a privileged user to escalate privileges further could lead to unauthorized access to sensitive data, manipulation of GPU computations, or disruption of critical services. Confidentiality, integrity, and availability impacts are all rated high, meaning that exploitation could result in data breaches, system corruption, or denial of service conditions. Organizations with multi-user environments or shared systems are particularly vulnerable, as any privileged user could leverage this flaw to gain broader control. The absence of required user interaction and low attack complexity increases the likelihood of exploitation in environments where local privileged access is possible. This vulnerability could also be leveraged as a stepping stone for further attacks within a network, potentially affecting broader organizational infrastructure.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Monitor Intel’s official advisories for firmware and driver updates addressing CVE-2025-32091 and apply them promptly once available. 2) Restrict privileged user access to systems with Intel Arc B-series GPUs, enforcing the principle of least privilege to minimize the number of users who can exploit this vulnerability. 3) Implement strict access controls and auditing on GPU device drivers and associated firmware interfaces to detect and prevent unauthorized modifications. 4) Employ endpoint detection and response (EDR) solutions capable of monitoring unusual privilege escalation activities related to GPU drivers. 5) For critical systems, consider isolating or segmenting machines with affected GPUs to limit lateral movement in case of compromise. 6) Conduct regular security training to ensure administrators understand the risks of privilege escalation vulnerabilities and the importance of timely patching. 7) Evaluate the necessity of Intel Arc B-series GPUs in sensitive environments and consider alternative hardware if risk mitigation is insufficient.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2025-32091: Escalation of Privilege in Intel(R) Arc(TM) B-series GPUs
Description
Incorrect default permissions in some firmware for the Intel(R) Arc(TM) B-series GPUs within Ring 1: Device Drivers may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-32091 is a vulnerability identified in the firmware of Intel Arc B-series GPUs, specifically within the Ring 1 device drivers. The root cause is incorrect default permissions set in the GPU firmware, which allows a system software adversary with privileged user access to escalate their privileges further. The attack complexity is low, and no user interaction is required, making the vulnerability easier to exploit once local privileged access is obtained. The vulnerability affects the confidentiality, integrity, and availability of the system at a high level, potentially allowing an attacker to gain unauthorized control over GPU operations or the host system. The vulnerability does not require special internal knowledge, which broadens the potential attacker base to any privileged user on the system. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no attack prerequisites (AT:N), requires privileged access (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to systems using affected Intel Arc B-series GPUs. The affected versions are not explicitly listed but are referenced in Intel advisories. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure. The lack of patch links suggests that mitigations or firmware updates may still be pending or in development.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in sectors relying on Intel Arc B-series GPUs for compute-intensive tasks such as research, engineering, and graphics processing. The ability for a privileged user to escalate privileges further could lead to unauthorized access to sensitive data, manipulation of GPU computations, or disruption of critical services. Confidentiality, integrity, and availability impacts are all rated high, meaning that exploitation could result in data breaches, system corruption, or denial of service conditions. Organizations with multi-user environments or shared systems are particularly vulnerable, as any privileged user could leverage this flaw to gain broader control. The absence of required user interaction and low attack complexity increases the likelihood of exploitation in environments where local privileged access is possible. This vulnerability could also be leveraged as a stepping stone for further attacks within a network, potentially affecting broader organizational infrastructure.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Monitor Intel’s official advisories for firmware and driver updates addressing CVE-2025-32091 and apply them promptly once available. 2) Restrict privileged user access to systems with Intel Arc B-series GPUs, enforcing the principle of least privilege to minimize the number of users who can exploit this vulnerability. 3) Implement strict access controls and auditing on GPU device drivers and associated firmware interfaces to detect and prevent unauthorized modifications. 4) Employ endpoint detection and response (EDR) solutions capable of monitoring unusual privilege escalation activities related to GPU drivers. 5) For critical systems, consider isolating or segmenting machines with affected GPUs to limit lateral movement in case of compromise. 6) Conduct regular security training to ensure administrators understand the risks of privilege escalation vulnerabilities and the importance of timely patching. 7) Evaluate the necessity of Intel Arc B-series GPUs in sensitive environments and consider alternative hardware if risk mitigation is insufficient.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- intel
- Date Reserved
- 2025-04-10T03:00:30.705Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69136b7312d2ca32afccdb99
Added to database: 11/11/2025, 4:59:31 PM
Last enriched: 11/18/2025, 5:48:28 PM
Last updated: 11/22/2025, 10:23:37 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.