Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10865: CWE-416: Use After Free in Imagination Technologies Graphics DDK

0
High
VulnerabilityCVE-2025-10865cvecve-2025-10865cwe-416
Published: Tue Jan 13 2026 (01/13/2026, 17:26:45 UTC)
Source: CVE Database V5
Vendor/Project: Imagination Technologies
Product: Graphics DDK

Description

CVE-2025-10865 is a high-severity use-after-free vulnerability in Imagination Technologies' Graphics DDK affecting versions 1. 15 RTM, 1. 17 RTM, 1. 18 RTM, and 23. 2 RTM. The flaw arises from improper reference counting of internal GPU resources when software running as a non-privileged user issues certain GPU system calls, leading to potential use-after-free conditions. Exploitation could allow an attacker to execute arbitrary code with limited privileges, impacting confidentiality, integrity, and availability of affected systems. No known exploits are currently in the wild. The vulnerability requires local access with low privileges but no user interaction. European organizations using affected Graphics DDK versions in embedded or graphics-intensive devices should prioritize patching once available.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:37:26 UTC

Technical Analysis

CVE-2025-10865 is a use-after-free vulnerability classified under CWE-416 found in the Graphics Device Driver Kit (DDK) developed by Imagination Technologies. The vulnerability stems from improper reference counting of internal GPU resources when software running as a non-privileged user issues certain GPU system calls. This mismanagement leads to a scenario where a resource may be freed prematurely while still being referenced, causing a use-after-free condition. Such a condition can be exploited to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory or crashing the GPU driver. The affected versions include 1.15 RTM, 1.17 RTM, 1.18 RTM, and 23.2 RTM. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction but does require the attacker to have local access with limited privileges. No public exploits have been reported yet, but the potential for exploitation exists given the nature of the flaw. The Graphics DDK is commonly used in embedded systems, mobile devices, and graphics-intensive applications, making this vulnerability relevant for devices relying on Imagination Technologies GPUs. The improper reference counting suggests a flaw in the internal resource lifecycle management within the GPU driver, which could be triggered by crafted GPU system calls. This vulnerability highlights the risks of GPU driver bugs that can be exploited from non-privileged contexts, emphasizing the need for secure driver design and rigorous resource management.

Potential Impact

For European organizations, the impact of CVE-2025-10865 can be significant, especially those relying on embedded systems, mobile devices, or specialized hardware using Imagination Technologies Graphics DDK. Exploitation could lead to local privilege escalation, allowing attackers to execute arbitrary code with the privileges of the GPU driver, potentially compromising system confidentiality, integrity, and availability. This could result in unauthorized data access, system crashes, or persistent malware installation. Industries such as automotive, telecommunications, and manufacturing, which often use embedded GPUs for graphics or compute tasks, may face operational disruptions or data breaches. The vulnerability's local attack vector means that insider threats or attackers who gain initial footholds could leverage this flaw to deepen access. The absence of known exploits currently reduces immediate risk, but the high severity score and potential impact warrant proactive mitigation. European organizations with supply chains or products incorporating affected GPUs should assess their exposure and prepare for patch deployment. Failure to address this vulnerability could lead to targeted attacks exploiting GPU driver weaknesses, especially in environments where GPU access is less restricted.

Mitigation Recommendations

1. Monitor Imagination Technologies' official channels for patches or updates addressing CVE-2025-10865 and apply them promptly once available. 2. Restrict access to GPU system interfaces to trusted users and processes only, minimizing the risk of unprivileged exploitation. 3. Implement strict access controls and sandboxing for applications that interact with the GPU to limit potential attack surfaces. 4. Employ runtime monitoring and anomaly detection tools to identify unusual GPU system calls or behaviors indicative of exploitation attempts. 5. For embedded or specialized devices, review and update firmware and driver versions to the latest secure releases. 6. Conduct security audits of systems using the affected Graphics DDK versions to identify and isolate vulnerable devices. 7. Educate internal teams about the risks of GPU driver vulnerabilities and the importance of least privilege principles. 8. Consider network segmentation and endpoint protection to contain potential compromises arising from local exploitation. 9. Collaborate with hardware and software vendors to ensure timely vulnerability management and incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
imaginationtech
Date Reserved
2025-09-23T07:31:35.940Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696683cba60475309f96bab6

Added to database: 1/13/2026, 5:41:31 PM

Last enriched: 1/21/2026, 2:37:26 AM

Last updated: 2/7/2026, 7:41:43 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats