Intel reports wave of high-severity GPU vulnerabilities — ten unique security vulnerabilities stemming from poor software hit range of graphics solutions

Intel
(Image credit: Intel)

Everyone with any Intel graphics solution should be sure to update their drivers this week—the tech giant just announced ten new security vulnerabilities affecting a wide range of its GPU drivers and software. Nearly every Intel GPU or integrated graphics going back to the 6th generation of Core processors is affected by one or more of these vulnerabilities, which can be addressed by updating to the latest Intel graphics drivers.

The laundry list of vulnerabilities coming from Team Blue all require local access to take advantage of, greatly downgrading their importance to the average user. As the saying goes, if a hostile attacker has local access to your system, you have bigger things to worry about than side-channel attacks. But a group of vulnerabilities affecting Intel's entire graphics operation, going back to Skylake CPUs, is no laughing matter.

"Improper access control" for graphics software and drivers is the most serious repeat offender on the list. The vulnerabilities allow for escalation of privilege, denial of service, and information disclosure attacks. The integrated graphics software of every consumer CPU release since 6th-gen Intel Core, all Iris Xe and Arc GPUs, and Intel Data Center GPU Flex 140/170 GPUs are affected by one or more vulnerabilities and should be updated to the most recent drivers. Every user using drivers released after October 2024 is already protected from the vulnerabilities.

This great wave of security holes immediately follows another Intel security event. Earlier this week, researchers at ETH Zurich found a new way around Intel's fixes for the data-leaking Spectre v2 vulnerability, prompting its own round of advisories and fixes from Team Blue. Intel's CPU architecture is consistently plagued by side-channel and branch prediction attacks like Spectre, with its hardware and software fixes prone to being maneuvered around.

The CPU vulnerability discovered by Zurich also affected a wide swath of Intel CPUs, though the attack also requires local access and, according to Intel, has no real-world applications yet discovered. Intel advises anyone with an affected CPU to consult their system manufacturer for BIOS or microcode updates.

Intel's software weaknesses seem like a perennial issue for the tech giant, yet another problem weighing on the company in danger. Intel recently announced that its Intel Foundry program is not expected to break even until 2027, another issue for the company which has had multiple waves of layoffs this year. Intel's future is uncertain, making its proclivity for security flaws and vulnerabilities all the more serious.

Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

TOPICS
Dallin Grimm
Contributing Writer

Dallin Grimm is a contributing writer for Tom's Hardware. He has been building and breaking computers since 2017, serving as the resident youngster at Tom's. From APUs to RGB, Dallin has a handle on all the latest tech news. 

  • ThisIsMe
    You guys already post at least one over-hyped, negative article about Intel every day. Is it really necessary to add a recap of every one of them to every one of them? Is it a requirement for you all to append this summary? Is there a word count requirement? Do you guys get paid per word?

    Maybe I’m in the minority, but please just post the facts. Here’s the tl;dr

    Intel posted some security vulnerability notices. They’ve been patched for at least 7 months now. Be sure to update drivers if you haven’t yet.
    Reply
  • TerryLaze
    ThisIsMe said:
    You guys already post at least one over-hyped, negative article about Intel every day. Is it really necessary to add a recap of every one of them to every one of them? Is it a requirement for you all to append this summary? Is there a word count requirement? Do you guys get paid per word?

    Maybe I’m in the minority, but please just post the facts. Here’s the tl;dr

    Intel posted some security vulnerability notices. They’ve been patched for at least 7 months now. Be sure to update drivers if you haven’t yet.
    click through rate
    Google what it means.
    Reply
  • Amdlova
    ThisIsMe said:
    You guys already post at least one over-hyped, negative article about Intel every day. Is it really necessary to add a recap of every one of them to every one of them? Is it a requirement for you all to append this summary? Is there a word count requirement? Do you guys get paid per word?

    Maybe I’m in the minority, but please just post the facts. Here’s the tl;dr

    Intel posted some security vulnerability notices. They’ve been patched for at least 7 months now. Be sure to update drivers if you haven’t yet.
    We like to read how intel fail everytime :)
    Reply
  • rluker5
    Not everyone is affected. Current gen products like Arrow Lake and Battlemage dGPUs came out after these vulnerabilities were patched. So they are not new vulnerabilities in the sense that the current generation is, but they are new compared to hills and rivers and things.

    It wouldn't sound as urgent if they put it in that perspective. I vaguely remember thinking a long time back that it was nice that my Broadwell was just old enough to be immune and recently I learned that it is just new enough to still be supported by Windows 10. At least while W10 is.

    Edit: Maybe Tom's could include the current list of ignored, unpatched vulnerabilities that AMD has in AMD articles instead of showing an intel chip in an article about a new vulnerability class specific to AMD that they tried to pass off as affecting all chips. : https://www.tomshardware.com/pc-components/cpus/worlds-first-cpu-level-ransomware-can-bypass-every-freaking-traditional-technology-we-have-out-there-new-firmware-based-attacks-could-usher-in-new-era-of-unavoidable-ransomware#xenforo-comments-3879481
    Reply