The latest security information on Intel® products.
Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.
||Mobile and Desktop platforms, based on the 5th Generation Intel Core Processor with Iris Pro Graphics 6200, Iris Graphics 6100, or HD Graphics 6000, using the Intel Graphics Driver versions 15.40.x.4865, or 20.19.x.4865, are currently understood to be affected. Earlier versions of this driver (i.e. those having a last number lower than 4865) may also be impacted.|
|Impact of vulnerability:
||Denial of Service|
||6.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H|
||May 14, 2018|
||May 14, 2018|
The Intel Graphics driver (15.40.x.4865 or 20.19.x.4865) may fail to properly perform a bounds check which allows unprivileged users to cause a denial of service on the listed processors.
The Intel® Graphics Drivers for Windows version 15.40.x.4865 (or earlier) running on a 5th Generation Core™ processor with Intel Iris™ Pro graphics 6200, Intel Iris Graphics 6100, or Intel HD Graphics 6000, may fail to adequately validate hardware state making it possible to attempt to access temporarily disabled hardware, resulting in a Denial of Service condition.
6.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
Mobile and Desktop platforms, based on the 5th Generation Intel Core Processor with Iris Pro Graphics 6200, Iris Graphics 6100, or HD Graphics 6000, using the Intel Graphics Driver versions 15.40.x.4865, or 20.19.x.4865, are currently understood to be affected. Earlier versions of this driver (i.e. those having a last number lower than 4865) may also be impacted. No other driver branches or other processors are presently known to be impacted.
 An “x” in the driver version number indicates that the specific value is not relevant in assessing if the driver is impacted. Drivers with the last number lower than 4865 may also be impacted. may fail to properly perform a bounds check which allows unprivileged users to cause a denial of service on the listed processors.
 Third party marks and brands are the property of their respective owners.
Check with your system’s manufacturer to see if they provide an updated graphics driver. Alternatively, you can use the Intel® Driver and Support Assistant to identify and update your driver directly from Intel. The Driver and Support Assistant can be found at https://www.intel.com/content/www/us/en/support.html.
Direct links to the available graphics drivers can be found at https://downloadcenter.intel.com and searching for the relevant version number above. You can also search for graphics drivers compatible with your particular system. Intel recommends that users with affected drivers download and upgrade to the latest supported driver version. The driver with the highest last number is the latest. For example, 22.214.171.12463 is a later version than 126.96.36.19965 because 4963 is a higher number than 4865.
Intel recommends that System Manufacturers remove the potentially vulnerable driver from download sites and replace it with the latest mitigated version of that driver code branch. The first mitigated version of the impacted driver branch is 15.40.x.4963, and System Manufacturers. Future versions of this branch (last number greater than 4963) will also contain the mitigation. Additionally, potentially vulnerable driver versions on shipping systems should be upgraded to the latest mitigated driver compatible with those systems.
Intel would like to thank Haifei Li of McAfee for responsibly reporting CVE-2018-3611 and working collaboratively with Intel Corporation on a coordinated public disclosure.
|1.0||May 14, 2018||Initial Release|
CVE Name: CVE-2018-3611
Legal Notices and Disclaimers
Intel provides these materials as-is, with no express or implied warranties.
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://intel.com.
Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.
Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © Intel Corporation 2022
Report a Vulnerability
If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to email@example.com. Encrypt sensitive information using our PGP public key.
Please provide as much information as possible, including:
- The products and versions affected
- Detailed description of the vulnerability
- Information on known exploits
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.