Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-18090 : What You Need to Know

Learn about CVE-2018-18090, an out of bounds read vulnerability in Intel Graphics Driver for Windows, allowing denial of service attacks. Find mitigation steps here.

An authenticated user with local access to Intel(R) Graphics Driver for Windows* versions before 10.18.x.5059, 10.18.x.5057, 20.19.x.5063, 21.20.x.5064, and 24.20.100.6373 may cause denial of service by exploiting an out of bounds read in igdkm64.sys.

Understanding CVE-2018-18090

This CVE involves a vulnerability in Intel(R) Graphics Driver for Windows that could lead to denial of service attacks.

What is CVE-2018-18090?

CVE-2018-18090 is an out of bounds read vulnerability in igdkm64.sys in Intel(R) Graphics Driver for Windows versions before specific updates.

The Impact of CVE-2018-18090

The vulnerability could allow an authenticated user with local access to potentially enable denial of service attacks on affected systems.

Technical Details of CVE-2018-18090

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability lies in an out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows versions before certain updates.

Affected Systems and Versions

        Product: Intel(R) Graphics Driver for Windows
        Vendor: Intel Corporation
        Affected Versions: Multiple versions before 10.18.x.5059, 10.18.x.5057, 20.19.x.5063, 21.20.x.5064, and 24.20.100.6373

Exploitation Mechanism

An authenticated user with local access can exploit the vulnerability to cause denial of service by manipulating the out of bounds read in igdkm64.sys.

Mitigation and Prevention

Protecting systems from CVE-2018-18090 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply security updates provided by Intel Corporation promptly.
        Restrict access to vulnerable systems to authorized personnel only.

Long-Term Security Practices

        Regularly monitor and update system patches and security configurations.
        Conduct security training for users to recognize and report suspicious activities.
        Implement network segmentation to contain potential attacks.

Patching and Updates

Ensure that all affected systems are updated with the latest patches and versions released by Intel Corporation to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now