Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10865: CWE-416: Use After Free in Imagination Technologies Graphics DDK

0
High
VulnerabilityCVE-2025-10865cvecve-2025-10865cwe-416
Published: Tue Jan 13 2026 (01/13/2026, 17:26:45 UTC)
Source: CVE Database V5
Vendor/Project: Imagination Technologies
Product: Graphics DDK

Description

CVE-2025-10865 is a use-after-free vulnerability in Imagination Technologies' Graphics DDK affecting versions 1. 15 RTM, 1. 17 RTM, 1. 18 RTM, and 23. 2 RTM. The flaw arises from improper reference counting during GPU system calls made by software running as a non-privileged user, leading to potential memory mismanagement. Exploitation could allow attackers to execute arbitrary code or cause denial of service by leveraging the use-after-free condition. No known exploits are currently reported in the wild. The vulnerability does not require privileged access but does require the ability to run software on the affected system. European organizations using devices or systems with Imagination Technologies Graphics DDK are at risk, especially those in sectors relying on embedded graphics solutions.

AI-Powered Analysis

AILast updated: 01/13/2026, 17:55:53 UTC

Technical Analysis

CVE-2025-10865 is a use-after-free vulnerability classified under CWE-416 found in the Graphics Device Driver Kit (DDK) developed by Imagination Technologies. This vulnerability stems from improper management of reference counting on internal GPU resources when non-privileged software issues GPU system calls. Specifically, the flaw allows a scenario where a resource is freed prematurely while still being referenced, leading to a use-after-free condition. This memory mismanagement can be exploited to execute arbitrary code, escalate privileges, or cause denial of service by crashing the graphics subsystem. The affected versions include 1.15 RTM, 1.17 RTM, 1.18 RTM, and 23.2 RTM of the Graphics DDK. The vulnerability is notable because it can be triggered by software running without elevated privileges, increasing the attack surface. Although no public exploits are currently known, the nature of use-after-free vulnerabilities makes them attractive targets for attackers, especially in environments where GPU drivers are critical components. The lack of a CVSS score indicates the need for a severity assessment based on impact and exploitability factors. The vulnerability was reserved in September 2025 and published in January 2026, with no patches currently linked, emphasizing the need for vigilance and proactive mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to systems utilizing Imagination Technologies Graphics DDK, commonly found in embedded devices, mobile platforms, and specialized graphics hardware. Exploitation could lead to unauthorized code execution, potentially allowing attackers to bypass security controls, access sensitive data, or disrupt critical operations. This is particularly concerning for sectors such as automotive, telecommunications, industrial automation, and defense, where embedded graphics solutions are prevalent. The vulnerability could also facilitate lateral movement within networks if exploited on endpoint devices. The absence of known exploits currently reduces immediate risk but does not diminish the potential impact once exploitation techniques emerge. Additionally, denial of service conditions could affect availability of services relying on GPU acceleration, impacting business continuity. European organizations with stringent regulatory requirements around data protection and operational resilience must prioritize addressing this vulnerability to avoid compliance and reputational risks.

Mitigation Recommendations

1. Monitor Imagination Technologies' official channels for patches or updates addressing CVE-2025-10865 and apply them promptly once available. 2. Restrict execution of untrusted or unsigned software on systems using the affected Graphics DDK to reduce the risk of exploitation by non-privileged users. 3. Implement application whitelisting and GPU call monitoring where feasible to detect anomalous GPU system calls indicative of exploitation attempts. 4. Employ endpoint detection and response (EDR) solutions capable of identifying use-after-free exploitation patterns or unusual GPU driver behavior. 5. Conduct regular security assessments and code audits on software interacting with GPU drivers to identify and remediate potential misuse. 6. For embedded systems, ensure secure firmware update mechanisms are in place to facilitate timely deployment of fixes. 7. Network segmentation should be used to limit the spread of potential compromises originating from exploited devices. 8. Educate development and security teams about the risks associated with GPU driver vulnerabilities and the importance of secure coding and patch management practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
imaginationtech
Date Reserved
2025-09-23T07:31:35.940Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696683cba60475309f96bab6

Added to database: 1/13/2026, 5:41:31 PM

Last enriched: 1/13/2026, 5:55:53 PM

Last updated: 1/13/2026, 6:53:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats