CVE-2025-2879: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Arm Ltd Valhall GPU Kernel Driver
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.
AI Analysis
Technical Summary
CVE-2025-2879 is a vulnerability identified in the Arm Ltd Valhall GPU Kernel Driver and the Arm 5th Gen GPU Architecture Kernel Driver, affecting versions from r29p0 through r49p4 and r50p0 through r54p0. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, a local non-privileged user process can exploit improper GPU processing operations to access sensitive data that should be protected by the kernel driver. This occurs because the GPU kernel driver fails to enforce adequate access controls or properly isolate sensitive data during GPU operations, allowing unauthorized read access. The CVSS v3.1 base score is 5.1 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The vulnerability does not require elevated privileges or user interaction, making it easier for local attackers to exploit if they have access to the system. However, it is limited to local access, so remote exploitation is not feasible. No public exploits or patches are currently available, but the issue is published and tracked by Arm and the CVE database. This vulnerability could be leveraged to leak sensitive information from GPU memory or kernel data structures, potentially exposing cryptographic keys, user data, or other confidential information processed by the GPU. Given the widespread use of Arm GPUs in mobile devices, embedded systems, and increasingly in servers and edge computing, this vulnerability poses a risk to systems relying on these drivers for graphics or compute workloads.
Potential Impact
For European organizations, the exposure of sensitive information via this vulnerability could lead to data breaches involving confidential user data, intellectual property, or cryptographic materials processed by GPUs. Industries relying on Arm-based devices, including telecommunications, automotive, IoT, and mobile sectors, may be particularly affected. The vulnerability's local access requirement limits remote exploitation but insider threats or compromised local accounts could exploit it to escalate data access. This could undermine data confidentiality and integrity, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. Additionally, organizations using Arm GPUs in edge computing or cloud infrastructure may face risks if attackers gain local access to GPU-enabled nodes. The lack of availability impact reduces the risk of service disruption, but the confidentiality breach potential remains significant. The absence of known exploits in the wild currently lowers immediate risk but does not eliminate future exploitation possibilities once details become public.
Mitigation Recommendations
European organizations should implement strict access controls to limit local user access to systems running affected Arm GPU drivers. Employing least privilege principles and monitoring for unusual GPU driver usage or local process behavior can help detect exploitation attempts. Virtualization or containerization strategies that isolate GPU access may reduce exposure. Organizations should track Arm Ltd advisories closely and apply patches or driver updates promptly once released. In the interim, disabling or restricting GPU kernel driver usage where feasible, especially on sensitive systems, can mitigate risk. Security teams should audit systems for the presence of affected driver versions and assess exposure based on device roles. Additionally, integrating GPU driver monitoring into endpoint detection and response (EDR) solutions can enhance detection capabilities. For critical environments, consider hardware-based security features or trusted execution environments to protect sensitive GPU workloads.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2025-2879: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Arm Ltd Valhall GPU Kernel Driver
Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.
AI-Powered Analysis
Technical Analysis
CVE-2025-2879 is a vulnerability identified in the Arm Ltd Valhall GPU Kernel Driver and the Arm 5th Gen GPU Architecture Kernel Driver, affecting versions from r29p0 through r49p4 and r50p0 through r54p0. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, a local non-privileged user process can exploit improper GPU processing operations to access sensitive data that should be protected by the kernel driver. This occurs because the GPU kernel driver fails to enforce adequate access controls or properly isolate sensitive data during GPU operations, allowing unauthorized read access. The CVSS v3.1 base score is 5.1 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The vulnerability does not require elevated privileges or user interaction, making it easier for local attackers to exploit if they have access to the system. However, it is limited to local access, so remote exploitation is not feasible. No public exploits or patches are currently available, but the issue is published and tracked by Arm and the CVE database. This vulnerability could be leveraged to leak sensitive information from GPU memory or kernel data structures, potentially exposing cryptographic keys, user data, or other confidential information processed by the GPU. Given the widespread use of Arm GPUs in mobile devices, embedded systems, and increasingly in servers and edge computing, this vulnerability poses a risk to systems relying on these drivers for graphics or compute workloads.
Potential Impact
For European organizations, the exposure of sensitive information via this vulnerability could lead to data breaches involving confidential user data, intellectual property, or cryptographic materials processed by GPUs. Industries relying on Arm-based devices, including telecommunications, automotive, IoT, and mobile sectors, may be particularly affected. The vulnerability's local access requirement limits remote exploitation but insider threats or compromised local accounts could exploit it to escalate data access. This could undermine data confidentiality and integrity, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. Additionally, organizations using Arm GPUs in edge computing or cloud infrastructure may face risks if attackers gain local access to GPU-enabled nodes. The lack of availability impact reduces the risk of service disruption, but the confidentiality breach potential remains significant. The absence of known exploits in the wild currently lowers immediate risk but does not eliminate future exploitation possibilities once details become public.
Mitigation Recommendations
European organizations should implement strict access controls to limit local user access to systems running affected Arm GPU drivers. Employing least privilege principles and monitoring for unusual GPU driver usage or local process behavior can help detect exploitation attempts. Virtualization or containerization strategies that isolate GPU access may reduce exposure. Organizations should track Arm Ltd advisories closely and apply patches or driver updates promptly once released. In the interim, disabling or restricting GPU kernel driver usage where feasible, especially on sensitive systems, can mitigate risk. Security teams should audit systems for the presence of affected driver versions and assess exposure based on device roles. Additionally, integrating GPU driver monitoring into endpoint detection and response (EDR) solutions can enhance detection capabilities. For critical environments, consider hardware-based security features or trusted execution environments to protect sensitive GPU workloads.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Arm
- Date Reserved
- 2025-03-27T18:06:06.545Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692d70a066fdaac17027827a
Added to database: 12/1/2025, 10:40:32 AM
Last enriched: 12/8/2025, 11:50:52 AM
Last updated: 1/15/2026, 3:01:12 PM
Views: 167
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-71019: n/a
UnknownCVE-2025-70744: n/a
UnknownCVE-2026-0992: Uncontrolled Resource Consumption in Red Hat Red Hat Enterprise Linux 10
LowCVE-2026-0990: Uncontrolled Recursion in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2026-0989: Uncontrolled Recursion in Red Hat Red Hat Enterprise Linux 10
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.