Description
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain write permission to read-only wrapped user-mode memory.

This is caused by improper handling of the memory protections for the user-mode wrapped memory resource.
Published: 2026-03-09
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation via GPU Memory Write
Action: Immediate Patch
AI Analysis

Impact

The GPU driver for Imagination Technologies contains an insufficient permission check in the PhysmemWrapExtMem function that allows any non‑privileged user to perform GPU system calls with write attribute support enabled. This flaw permits the attacker to gain write access to memory that should be read‑only, effectively bypassing the driver’s memory protection safeguards. The vulnerability represents an Improper Access Control issue (CWE‑280) and can be used to modify memory used by other processes, allowing local privilege escalation or unauthorized data manipulation.

Affected Systems

Systems that run Imagination Technologies Graphics DDK version 25.1—including the RTM2 runtime—are affected when the driver is compiled or configured with write attribute support enabled. Any host that installs this DDK and allows non‑privileged users to issue GPU commands may be impacted; no other products or vendors are listed in the available data.

Risk and Exploitability

The CVSS base score of 4.4 indicates a moderate severity, while the EPSS score below 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog, and public exploits are not documented. Exploitation would require a local user with the ability to run GPU workloads, making the attack vector local. Given these conditions, the overall risk is moderate, but can be mitigated by applying vendor patches or disabling the write attribute feature.

Generated by OpenCVE AI on April 16, 2026 at 10:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Imagination Technologies Graphics DDK to a version that includes the memory protection fix, ensuring the PhysmemWrapExtMem permission checks are corrected.
  • If an updated DDK is unavailable, disable write attribute support in the GPU driver configuration to eliminate the write permission escalation path.
  • Enforce stricter kernel‑level authorization for GPU system calls, restricting memory wrapping operations to privileged processes only.

Generated by OpenCVE AI on April 16, 2026 at 10:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Imaginationtech ddk
CPEs cpe:2.3:a:imaginationtech:ddk:25.1:-:*:*:*:*:*:*
cpe:2.3:a:imaginationtech:ddk:25.1:rtm2:*:*:*:*:*:*
Vendors & Products Imaginationtech ddk

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Imaginationtech
Imaginationtech graphics Ddk
Vendors & Products Imaginationtech
Imaginationtech graphics Ddk

Mon, 09 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description Software installed and run as a non-privileged user may conduct improper GPU system calls to gain write permission to read-only wrapped user-mode memory. This is caused by improper handling of the memory protections for the user-mode wrapped memory resource.
Title GPU DDK - Insufficient permission check in PhysmemWrapExtMem() when write attribute support enabled
Weaknesses CWE-280
References

Subscriptions

Imaginationtech Ddk Graphics Ddk
cve-icon MITRE

Status: PUBLISHED

Assigner: imaginationtech

Published:

Updated: 2026-03-09T16:06:41.667Z

Reserved: 2026-01-05T11:57:27.258Z

Link: CVE-2026-21736

cve-icon Vulnrichment

Updated: 2026-03-09T16:06:31.993Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T13:15:56.120

Modified: 2026-03-10T18:46:06.370

Link: CVE-2026-21736

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:15:26Z

Weaknesses