Skip to main content

CVE-2024-47893: CWE - CWE-823: Use of Out-of-range Pointer Offset (4.16) in Imagination Technologies Graphics DDK

Medium
VulnerabilityCVE-2024-47893cvecve-2024-47893cwe-823
Published: Sat May 17 2025 (05/17/2025, 00:47:52 UTC)
Source: CVE
Vendor/Project: Imagination Technologies
Product: Graphics DDK

Description

Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to read and/or write data outside the Guest's virtualised GPU memory.

AI-Powered Analysis

AILast updated: 07/04/2025, 13:27:05 UTC

Technical Analysis

CVE-2024-47893 is a medium-severity vulnerability identified in the Graphics Device Driver Kit (DDK) version 1.15 RTM from Imagination Technologies. The vulnerability is classified under CWE-823, which refers to the use of out-of-range pointer offsets. Specifically, this flaw allows kernel-level software running inside a guest virtual machine (VM) to exploit shared memory with the GPU firmware. By doing so, the malicious or compromised kernel code can read from or write to memory regions outside the guest's allocated virtualized GPU memory. This memory corruption or unauthorized access can lead to leakage of sensitive data or unauthorized modification of data within the GPU memory space. The vulnerability does not require any privileges or user interaction to be exploited (AV:N/AC:L/PR:N/UI:N), making it remotely exploitable in a networked environment where the attacker can execute code inside the guest VM. However, the scope is limited to the guest VM environment and the GPU firmware memory shared with it. The CVSS score of 6.5 reflects a medium severity, indicating a moderate impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights a critical security concern in virtualized environments using Imagination Technologies' Graphics DDK, where isolation between guest VMs and GPU firmware memory is insufficiently enforced, potentially undermining the security guarantees of virtualization platforms relying on this GPU stack.

Potential Impact

For European organizations, especially those utilizing virtualized infrastructure with GPUs powered by Imagination Technologies' Graphics DDK, this vulnerability poses a risk of data leakage and unauthorized data manipulation within guest VMs. Industries relying on GPU-accelerated workloads in cloud or private data centers—such as financial services, research institutions, media production, and manufacturing—may face confidentiality breaches if attackers gain kernel-level access inside guest VMs. The ability to read or write outside allocated GPU memory could also facilitate further exploitation or lateral movement within virtualized environments. Although the vulnerability does not affect availability directly, the compromise of data integrity or confidentiality could lead to regulatory compliance issues under GDPR and other data protection laws prevalent in Europe. Additionally, organizations running multi-tenant cloud services or virtual desktop infrastructure (VDI) with this GPU stack may risk cross-tenant data exposure. The absence of known exploits currently reduces immediate risk, but the ease of exploitation without privileges or user interaction suggests a need for prompt attention to mitigate potential future attacks.

Mitigation Recommendations

European organizations should proactively audit their virtualization environments to identify the use of Imagination Technologies Graphics DDK version 1.15 RTM or similar affected versions. Until official patches are released, mitigation should focus on minimizing the attack surface by restricting kernel-level code execution within guest VMs to trusted workloads only. Employ strict access controls and monitoring on virtual machines with GPU passthrough or shared GPU resources. Consider disabling GPU virtualization features if not essential or isolating GPU resources per tenant to prevent cross-VM memory sharing. Implement runtime security controls such as kernel integrity monitoring and anomaly detection within guest VMs to detect suspicious memory access patterns. Engage with Imagination Technologies and virtualization platform vendors for timely updates and patches. Additionally, apply network segmentation and limit administrative access to hypervisors and management consoles to reduce the risk of initial compromise. Document and test incident response plans for potential GPU-related memory exploits to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
imaginationtech
Date Reserved
2024-10-04T16:08:49.937Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb485

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 1:27:05 PM

Last updated: 8/1/2025, 1:01:46 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats