CVE-2025-24835

6.5 MEDIUM

📋 TL;DR

A protection mechanism failure in Intel Graphics Driver for Arc B-Series graphics allows authenticated local users to potentially cause denial of service. This affects systems with Intel Arc B-Series graphics using vulnerable driver versions. Users with local access to affected systems are at risk.

💻 Affected Systems

Products:
  • Intel Graphics Driver for Intel Arc B-Series graphics
Versions: All versions before 32.0.101.6737
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel Arc B-Series graphics hardware. Requires authenticated local user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or instability requiring reboot, potentially disrupting critical operations on affected workstations.

🟠

Likely Case

Graphics driver crash leading to display issues, application failures, or temporary system unresponsiveness.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges and monitoring for suspicious activity.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local authenticated users could disrupt workstation availability, but requires specific access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of specific conditions to trigger the protection mechanism failure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 32.0.101.6737 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html

Restart Required: No

Instructions:

1. Download latest Intel Graphics Driver from Intel website. 2. Run installer. 3. Follow on-screen prompts. 4. No restart required but recommended for stability.

🔧 Temporary Workarounds

Restrict local user privileges

all

Limit standard user accounts to prevent exploitation attempts

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor systems for unusual graphics driver crashes or denial of service events

🔍 How to Verify

Check if Vulnerable:

Check Intel Graphics Driver version in Device Manager (Windows) or via 'intel_gpu_top' command (Linux).

Check Version:

Windows: dxdiag or Device Manager. Linux: intel_gpu_top or check /sys/class/drm/card*/device/uevent

Verify Fix Applied:

Confirm driver version is 32.0.101.6737 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Graphics driver crash events
  • System event logs showing display driver failures
  • Application crashes related to graphics

Network Indicators:

  • None - local attack only

SIEM Query:

EventID=1001 OR EventID=4101 (Windows) OR kernel logs containing 'i915' or 'Intel graphics' errors (Linux)

🔗 References

📤 Share & Export