CVE-2024-47897

8.8 HIGH

📋 TL;DR

This vulnerability allows non-privileged user applications to make improper GPU system calls through Imagination Technologies GPU drivers, causing platform instability and system reboots. It affects systems using Imagination GPU hardware with vulnerable drivers. The impact is denial of service through system crashes.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific vulnerable versions not detailed in reference; check Imagination advisory for exact ranges.
Operating Systems: Linux, Android, and other OS using Imagination GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where non-privileged users can run GPU-accelerated applications. Virtualization environments may be impacted if GPU passthrough is used.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system instability leading to persistent reboots, rendering the system unusable and potentially causing data loss or corruption.

🟠

Likely Case

Application crashes or system reboots when malicious or buggy applications exploit the vulnerability, causing temporary denial of service.

🟢

If Mitigated

Minimal impact if proper privilege separation and driver hardening are implemented.

🌐 Internet-Facing: LOW - Requires local access or malicious application execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious insider or compromised local application could cause system instability affecting availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to execute code on the target system. The vulnerability is in GPU driver interface handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Imagination Technologies advisory for specific patched driver versions.

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: No

Instructions:

1. Visit Imagination Technologies advisory page. 2. Identify affected driver version for your hardware. 3. Download and install patched GPU driver from vendor. 4. Verify driver update completes without requiring reboot.

🔧 Temporary Workarounds

Restrict GPU access

Linux

Limit GPU device access to privileged users only by modifying device permissions.

sudo chmod 600 /dev/dri/renderD*
sudo chown root:root /dev/dri/renderD*

🧯 If You Can't Patch

  • Implement strict application control to prevent untrusted users from running GPU-accelerated applications.
  • Use containerization or virtualization with GPU isolation to limit blast radius of potential exploitation.

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Imagination advisory. Use: glxinfo | grep 'OpenGL renderer' for GPU info, then compare with vendor list.

Check Version:

For Linux: cat /sys/class/drm/card*/device/version or check package manager for GPU driver version.

Verify Fix Applied:

Verify installed GPU driver version matches or exceeds patched version from advisory. Use vendor-specific verification tools if available.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing GPU driver crashes (dmesg | grep -i gpu)
  • System logs indicating unexpected reboots with GPU-related errors prior to crash.

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("GPU" OR "drm" OR "render") AND ("panic" OR "crash" OR "Oops")

🔗 References

📤 Share & Export