CVE-2025-13952

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution through malicious web pages containing specially crafted GPU shader code. When loaded, it triggers a use-after-free condition in the GPU shader compiler library, potentially allowing attackers to execute arbitrary code with system privileges on affected platforms. Users of Imagination Technologies GPU drivers are affected when visiting malicious websites.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; likely multiple recent versions
Operating Systems: Android, Linux, Embedded systems using Imagination GPUs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where GPU compiler process runs with elevated privileges. Mobile devices and embedded systems are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level privileges, enabling persistent malware installation, data theft, and complete device control.

🟠

Likely Case

Browser compromise leading to session hijacking, credential theft, and installation of additional malware payloads.

🟢

If Mitigated

Browser sandboxing prevents privilege escalation, limiting impact to browser process isolation boundaries.

🌐 Internet-Facing: HIGH - Exploitable via malicious web pages without user interaction beyond visiting the site.
🏢 Internal Only: MEDIUM - Requires internal users to visit malicious sites, but could be exploited via phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting specific GPU shader code but no authentication needed. Browser-based exploitation makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check vendor advisory

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: Yes

Instructions:

1. Visit Imagination Technologies security advisory. 2. Identify affected driver versions. 3. Download and apply latest GPU driver updates. 4. Reboot system to load new drivers.

🔧 Temporary Workarounds

Disable WebGL/GPU acceleration

all

Prevents malicious shader code execution in browsers

Browser-specific: chrome://flags/#disable-accelerated-2d-canvas
Browser-specific: about:config -> webgl.disabled true

Browser sandbox hardening

all

Enforce strict browser sandboxing to limit privilege escalation

Linux: firejail --profile=chromium chromium
Windows: Configure AppContainer sandboxing

🧯 If You Can't Patch

  • Implement network filtering to block known malicious domains serving GPU shader exploits
  • Deploy application allowlisting to prevent unauthorized GPU compiler process execution

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against vendor advisory. Use browser developer tools to check WebGL/GPU capabilities.

Check Version:

Linux: glxinfo | grep 'OpenGL renderer'; Android: adb shell dumpsys gpu

Verify Fix Applied:

Verify GPU driver version updated. Test with browser GPU diagnostics tools.

📡 Detection & Monitoring

Log Indicators:

  • GPU process crashes
  • Browser renderer process abnormal termination
  • Kernel logs showing memory access violations

Network Indicators:

  • HTTP requests for WebGL/shader resources from suspicious domains
  • Unusual GPU memory allocation patterns

SIEM Query:

process_name:"chrome" AND event_type:crash AND module:"gpu" OR process_name:"gpu-process" AND exit_code:exception

🔗 References

📤 Share & Export