CVE-2024-43704

8.4 HIGH

📋 TL;DR

This vulnerability allows non-privileged user processes to make improper GPU system calls to access the graphics buffers of parent processes. This affects systems using Imagination Technologies GPU drivers where unprivileged users can execute GPU-accelerated applications. The issue enables potential data leakage between processes.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; likely multiple versions prior to patching
Operating Systems: Linux, Android, Other systems using Imagination GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Imagination GPU drivers are installed and non-privileged users can run GPU-accelerated applications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive graphical data from other processes, potentially including authentication interfaces, confidential documents, or protected content displayed on screen.

🟠

Likely Case

Information disclosure of graphical data from other applications, potentially exposing sensitive information displayed in windows or buffers.

🟢

If Mitigated

Limited impact with proper process isolation and minimal sensitive graphical data in memory.

🌐 Internet-Facing: LOW - Requires local process execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires local user access but could be exploited by malicious insiders or compromised user accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local user access and ability to execute GPU-accelerated applications. Exploitation involves crafting specific GPU system calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check Imagination Technologies advisories

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: Yes

Instructions:

1. Check Imagination Technologies security advisory for specific patch versions
2. Update GPU drivers to patched version
3. Reboot system to load updated drivers
4. Verify driver version after update

🔧 Temporary Workarounds

Restrict GPU access

linux

Limit non-privileged user access to GPU acceleration features

# Configure system to restrict GPU device access
# Use group policies or permissions to control /dev/dri/* access

Process isolation hardening

linux

Implement stricter process isolation and sandboxing for GPU applications

# Use containerization or sandboxing for GPU applications
# Implement mandatory access controls (SELinux/AppArmor)

🧯 If You Can't Patch

  • Implement strict user privilege separation and limit GPU device access to trusted users only
  • Monitor for unusual GPU system call patterns and implement application whitelisting for GPU-accelerated programs

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Imagination Technologies advisory and verify if unprivileged users can access GPU devices

Check Version:

glxinfo | grep 'OpenGL renderer' or check GPU driver package version via package manager

Verify Fix Applied:

Verify GPU driver version matches patched version from vendor advisory and test that unprivileged processes cannot access parent process graphics buffers

📡 Detection & Monitoring

Log Indicators:

  • Unusual GPU system calls from non-privileged processes
  • Multiple failed GPU buffer access attempts
  • Processes attempting to access GPU devices without proper permissions

Network Indicators:

  • Not applicable - local vulnerability only

SIEM Query:

Process executing GPU system calls with unusual parent-child relationships OR Failed GPU device access attempts from non-privileged users

🔗 References

📤 Share & Export