Skip to main content

CVE-2025-0932: CWE-416 Use After Free in Arm Ltd Bifrost GPU Userspace Driver

Medium
VulnerabilityCVE-2025-0932cvecve-2025-0932cwe-416
Published: Mon Aug 04 2025 (08/04/2025, 10:00:57 UTC)
Source: CVE Database V5
Vendor/Project: Arm Ltd
Product: Bifrost GPU Userspace Driver

Description

Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to gain access to already freed memory.This issue affects Bifrost GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0.

AI-Powered Analysis

AILast updated: 08/12/2025, 00:51:19 UTC

Technical Analysis

CVE-2025-0932 is a Use After Free (UAF) vulnerability identified in the Arm Ltd Bifrost GPU Userspace Driver, as well as the Valhall GPU Userspace Driver and the Arm 5th Gen GPU Architecture Userspace Driver. This vulnerability arises when a non-privileged user process, including those executing GPU operations via WebGL or WebGPU APIs, can access memory that has already been freed. Specifically, the affected driver versions include Bifrost GPU Userspace Driver releases from r48p0 through r49p3 and r50p0 through r51p0; Valhall GPU Userspace Driver versions from r48p0 through r49p3 and r50p0 through r54p0; and Arm 5th Gen GPU Architecture Userspace Driver versions from r48p0 through r49p3 and r50p0 through r54p0. The vulnerability is classified under CWE-416, which denotes Use After Free errors where a program continues to use a pointer after the memory it points to has been freed, potentially leading to undefined behavior or security issues. The exploitation vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality only (C:L), with no impact on integrity or availability. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to read sensitive information from freed memory regions, potentially leaking data processed by the GPU or other system components. Since GPU drivers are integral to graphics processing and increasingly used in compute tasks, this vulnerability could be leveraged in sandboxed environments such as browsers using WebGL/WebGPU, increasing the attack surface for non-privileged users to access sensitive memory contents.

Potential Impact

For European organizations, the impact of CVE-2025-0932 is primarily related to confidentiality breaches. Organizations relying on devices or systems with affected Arm GPU drivers, especially those using WebGL or WebGPU in browsers or GPU-accelerated applications, could face risks of sensitive data leakage. This is particularly relevant for sectors handling sensitive or regulated data, such as finance, healthcare, and government agencies. Although the vulnerability does not directly affect integrity or availability, the exposure of confidential information could lead to secondary impacts such as intellectual property theft, exposure of personal data under GDPR, or leakage of cryptographic keys or credentials processed via GPU. The fact that exploitation requires only low privileges but no user interaction means that compromised or malicious local user accounts or sandboxed browser environments could potentially exploit this flaw. Given the widespread use of Arm-based devices in mobile, embedded, and increasingly in server environments across Europe, the vulnerability could affect a broad range of endpoints. However, the absence of known exploits and the medium severity score suggest that immediate large-scale impact is limited but should not be underestimated, especially in high-security environments.

Mitigation Recommendations

To mitigate CVE-2025-0932, European organizations should prioritize the following actions: 1) Monitor Arm Ltd’s official channels for patches or updated driver releases addressing this vulnerability and apply them promptly once available. 2) Implement strict access controls to limit non-privileged user processes from executing untrusted GPU workloads, particularly in multi-user or shared environments. 3) Restrict or sandbox WebGL and WebGPU usage in browsers through group policies or browser configuration to reduce exposure, especially on systems with vulnerable drivers. 4) Employ endpoint detection and response (EDR) tools capable of monitoring unusual GPU usage patterns or memory access anomalies that could indicate exploitation attempts. 5) For critical systems, consider disabling GPU acceleration features temporarily if feasible until patches are deployed. 6) Conduct security awareness training to inform users about the risks of running untrusted web content that could leverage GPU APIs. 7) Maintain up-to-date inventories of hardware and software to identify affected devices and prioritize remediation. These measures go beyond generic advice by focusing on controlling GPU workload execution and browser GPU API usage, which are the primary vectors for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Arm
Date Reserved
2025-01-31T14:19:56.294Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689088c0ad5a09ad00dffba0

Added to database: 8/4/2025, 10:17:36 AM

Last enriched: 8/12/2025, 12:51:19 AM

Last updated: 9/15/2025, 1:42:04 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats