Impact
The vulnerability allows malware to misuse the Graphics DDK kernel module IOCTL interface to perform writes to arbitrary physical memory pages, thereby subverting the GPU's behavior. This unsynchronised concurrent access to a shared resource creates a race condition that can be exploited to trigger write operations outside the intended memory boundaries. The result is the potential for arbitrary code execution or other malicious actions on the host system.
Affected Systems
Imagination Technologies Graphics DDK is affected. No specific version information is provided in the data, so any installation of the product that includes the DDK kernel module is potentially vulnerable.
Risk and Exploitability
With a CVSS score of 7.8 the vulnerability is considered high severity, but the EPSS score is less than 1%, indicating a low likelihood of active exploitation currently. The vulnerability is not listed in the CISA KEV catalog. Attackers need to deliver code that can call the unsupported IOCTL, typically requiring local or privileged access to the host system. If successful, the exploit can read or write arbitrary kernel memory, enabling attackers to compromise confidentiality, integrity, or availability of the affected system.
OpenCVE Enrichment