CVE-2023-47165

6.0 MEDIUM

📋 TL;DR

This vulnerability in Intel Data Center GPU Max Series 1100 and 1550 products allows a privileged user to cause denial of service through improper conditions checking. The flaw enables local attackers with elevated privileges to disrupt GPU functionality. Only systems with these specific Intel GPU products are affected.

💻 Affected Systems

Products:
  • Intel Data Center GPU Max Series 1100
  • Intel Data Center GPU Max Series 1550
Versions: All versions prior to patched firmware
Operating Systems: Linux (primary), Windows (if supported)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with these specific Intel GPU products installed and configured

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete GPU failure requiring system reboot, disrupting computational workloads and services dependent on GPU acceleration

🟠

Likely Case

Temporary GPU unavailability affecting specific processes or applications using the GPU

🟢

If Mitigated

Minimal impact with proper privilege separation and monitoring in place

🌐 Internet-Facing: LOW - Requires local access and privileged credentials
🏢 Internal Only: MEDIUM - Internal privileged users could intentionally or accidentally trigger the condition

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and privileged user credentials. No public exploit code available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Intel advisory for specific firmware versions

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01041.html

Restart Required: Yes

Instructions:

1. Review Intel advisory SA-01041. 2. Download updated firmware from Intel. 3. Apply firmware update following Intel's instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Restrict privileged access

all

Limit root/administrator access to systems with affected GPUs

# Use standard OS privilege management tools
# Implement least privilege principles

Monitor GPU health

linux

Implement monitoring for GPU status and performance anomalies

# Use Intel GPU monitoring tools
# Configure system monitoring for GPU-related events

🧯 If You Can't Patch

  • Implement strict access controls to limit who can interact with GPU systems
  • Monitor for unusual GPU behavior and implement automated alerting for GPU failures

🔍 How to Verify

Check if Vulnerable:

Check GPU firmware version using Intel GPU tools or system management utilities

Check Version:

intel_gpu_top --version or check system GPU firmware via vendor tools

Verify Fix Applied:

Verify firmware version matches patched version from Intel advisory

📡 Detection & Monitoring

Log Indicators:

  • GPU driver crashes
  • Unexpected GPU resets
  • Privileged user accessing GPU control functions

Network Indicators:

  • None - local attack only

SIEM Query:

Search for: GPU driver errors OR privileged user executing GPU control commands

🔗 References

📤 Share & Export