Skip to main content

CVE-2025-1246: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Arm Ltd Bifrost GPU Userspace Driver

High
VulnerabilityCVE-2025-1246cvecve-2025-1246cwe-119
Published: Mon Jun 02 2025 (06/02/2025, 11:06:07 UTC)
Source: CVE Database V5
Vendor/Project: Arm Ltd
Product: Bifrost GPU Userspace Driver

Description

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to access outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r18p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r28p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p3, from r50p0 through r54p0.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:40:26 UTC

Technical Analysis

CVE-2025-1246 is a high-severity vulnerability (CWE-119) affecting multiple versions of Arm Ltd's GPU userspace drivers, specifically the Bifrost, Valhall, and Arm 5th Gen GPU architecture drivers. The flaw arises from improper restriction of operations within the bounds of a memory buffer, allowing a non-privileged user process to perform GPU processing operations that access memory outside the allocated buffer bounds. This can be triggered through valid GPU workloads, including those initiated via WebGL or WebGPU interfaces, which are commonly used in web browsers and graphical applications. The affected driver versions span a broad range: Bifrost from r18p0 through r49p3 and r50p0 through r51p0; Valhall from r28p0 through r49p3 and r50p0 through r54p0; and Arm 5th Gen GPU architecture from r41p0 through r49p3 and r50p0 through r54p0. Exploitation does not require user interaction but does require local privileges (low privileges) and has low attack complexity. The vulnerability impacts confidentiality, integrity, and availability, potentially allowing an attacker to read or write arbitrary memory, escalate privileges, or cause denial of service by crashing the GPU driver or system. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that remediation may still be pending or in development. The CVSS v3.1 base score is 7.8, reflecting a high severity due to the broad impact and ease of exploitation with limited privileges.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those relying on devices or systems with Arm-based GPUs using the affected drivers. Industries such as telecommunications, automotive, embedded systems, and mobile device manufacturers in Europe that utilize Arm GPUs could face data breaches, system instability, or service disruptions. The ability for a non-privileged user process to exploit this flaw means that insider threats or compromised user accounts could leverage this vulnerability to escalate privileges or exfiltrate sensitive data. Additionally, web applications using WebGL or WebGPU could be vectors for exploitation if users access malicious content, potentially impacting organizations with web-facing services or employees using vulnerable hardware. The potential for denial of service could disrupt critical infrastructure or services, affecting operational continuity. Given the widespread use of Arm GPUs in embedded and mobile devices, the impact extends beyond traditional IT systems to IoT and edge devices common in European industrial and consumer environments.

Mitigation Recommendations

Organizations should prioritize identifying devices and systems running affected versions of the Arm Bifrost, Valhall, and 5th Gen GPU userspace drivers. Since no patches are currently linked, immediate mitigation includes restricting access to GPU resources for untrusted or low-privileged processes, implementing strict application whitelisting, and limiting the use of WebGL/WebGPU in browsers or applications where possible. Employing endpoint detection and response (EDR) solutions to monitor for anomalous GPU usage patterns or memory access violations can help detect exploitation attempts. Network segmentation and least privilege principles should be enforced to reduce the risk of lateral movement if exploitation occurs. Organizations should maintain close communication with Arm Ltd and hardware vendors for timely patch releases and apply updates promptly once available. Additionally, educating users about the risks of visiting untrusted web content that could trigger GPU-based exploits is advisable. For environments where patching is delayed, consider disabling or restricting GPU acceleration features in critical systems as a temporary workaround.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Arm
Date Reserved
2025-02-12T09:29:33.341Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683d94ca182aa0cae24279e7

Added to database: 6/2/2025, 12:10:50 PM

Last enriched: 7/9/2025, 12:40:26 PM

Last updated: 7/14/2025, 12:22:49 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats