CVE-2024-47900

7.8 HIGH

📋 TL;DR

This vulnerability allows non-privileged software to make improper GPU system calls that access out-of-bounds kernel memory. It affects systems using Imagination Technologies GPU drivers. Attackers could potentially read or modify kernel memory.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; check vendor advisory.
Operating Systems: Linux, Android, and other OS using affected GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires GPU driver from Imagination Technologies; exact configurations depend on device implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to privilege escalation, system compromise, or denial of service.

🟠

Likely Case

Information disclosure of kernel memory contents or limited system instability.

🟢

If Mitigated

Minimal impact if proper sandboxing and privilege separation are enforced.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on target system.
🏢 Internal Only: MEDIUM - Malicious local users or compromised applications could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local code execution and knowledge of GPU driver internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: No

Instructions:

1. Visit vendor advisory URL. 2. Identify affected driver version. 3. Apply recommended patch or update. 4. Verify GPU driver version after update.

🔧 Temporary Workarounds

Restrict GPU access

all

Limit GPU system call permissions to trusted applications only.

Use OS-specific access controls (e.g., SELinux, AppArmor) to restrict GPU device access.

🧯 If You Can't Patch

  • Implement strict application sandboxing to isolate GPU-using processes.
  • Monitor system logs for unusual GPU driver activity or memory access patterns.

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against vendor advisory; command varies by OS (e.g., 'modinfo' for Linux kernel modules).

Check Version:

OS-dependent; for Linux: 'modinfo [gpu_driver_module] | grep version' or check system logs.

Verify Fix Applied:

Confirm GPU driver version matches patched version from vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing GPU driver errors, memory access violations, or unusual system calls.

Network Indicators:

  • None - this is a local vulnerability.

SIEM Query:

Search for kernel logs containing 'GPU', 'out of bounds', or driver-specific error codes.

🔗 References

📤 Share & Export