CVE-2024-47895

7.1 HIGH

📋 TL;DR

This vulnerability allows kernel software in a Guest VM to send improper commands to GPU firmware, potentially reading data outside the Guest's allocated GPU memory boundaries. This affects systems using Imagination Technologies GPU hardware with vulnerable firmware/drivers in virtualized environments. The impact is limited to Guest VM escape scenarios in virtualization setups.

💻 Affected Systems

Products:
  • Imagination Technologies GPU hardware with vulnerable firmware/drivers
Versions: Specific versions not publicly detailed in reference; check vendor advisory for exact affected versions
Operating Systems: Any OS using affected Imagination GPU drivers in virtualized environments
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Imagination GPU hardware in virtualization scenarios where Guest VMs have GPU access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest VM escape leading to host system compromise, data exfiltration from other VMs or host memory, and potential privilege escalation within the virtualization environment.

🟠

Likely Case

Information disclosure from GPU memory regions, potentially exposing sensitive data from other VMs or the host system in multi-tenant virtualized environments.

🟢

If Mitigated

Limited impact with proper virtualization isolation controls, potentially only affecting the Guest VM's own memory space if hypervisor protections are effective.

🌐 Internet-Facing: LOW - This vulnerability requires local access to a Guest VM and cannot be directly exploited over the internet.
🏢 Internal Only: MEDIUM - Requires compromise of a Guest VM first, but could lead to significant impact in virtualized environments if exploited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires kernel-level access within a Guest VM and knowledge of GPU firmware interfaces. Exploitation depends on virtualization configuration and hypervisor protections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Imagination Technologies advisory for specific patched versions

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: No

Instructions:

1. Check Imagination Technologies advisory for affected products. 2. Update GPU firmware and drivers to patched versions. 3. Update hypervisor GPU virtualization components if applicable. 4. Verify Guest VM GPU access is properly isolated.

🔧 Temporary Workarounds

Disable GPU passthrough

all

Prevent Guest VMs from directly accessing GPU hardware

Hypervisor-specific configuration to disable GPU passthrough/virtualization

Restrict GPU access

all

Limit which Guest VMs have GPU access to reduce attack surface

Configure hypervisor to only allow trusted VMs GPU access

🧯 If You Can't Patch

  • Isolate GPU-enabled VMs in separate security zones with strict network segmentation
  • Implement enhanced monitoring for GPU memory access patterns and hypervisor escape attempts

🔍 How to Verify

Check if Vulnerable:

Check GPU firmware/driver versions against Imagination Technologies advisory. Review virtualization configuration for GPU passthrough settings.

Check Version:

System-specific commands to check GPU driver/firmware versions (e.g., lspci -v for GPU details, vendor-specific tools)

Verify Fix Applied:

Verify GPU firmware/driver versions are updated to patched versions. Test Guest VM GPU memory isolation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GPU firmware command patterns
  • Hypervisor logs showing unexpected GPU memory access
  • Guest VM kernel logs with GPU-related errors

Network Indicators:

  • Not network exploitable - focus on host/VM monitoring

SIEM Query:

Search for: GPU firmware access patterns, hypervisor escape attempts, Guest VM kernel privilege escalation

🔗 References

📤 Share & Export