CVE-2024-46975
Published: 22 February 2025
Summary
CVE-2024-46975 is a high-severity Privilege Context Switching Error (CWE-270) vulnerability in Imaginationtech (inferred from references). Its CVSS base score is 7.9 (High).
Operationally, ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SC-4 (Information in Shared System Resources).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Prevents unauthorized information transfer via shared GPU firmware memory, directly mitigating cross-VM memory writes by guest kernels.
Implements memory protection mechanisms to safeguard virtualized GPU memory from unauthorized writes by software in guest VMs.
Enforces process isolation to separate guest VM execution domains, blocking access to another guest's virtualized GPU memory.
NVD Description
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory.
Deeper analysisAI
CVE-2024-46975 is a vulnerability affecting GPU firmware and drivers, specifically those from Imagination Technologies, in virtualized environments. Kernel software running inside a Guest VM can exploit memory shared with the GPU Firmware to arbitrarily write data into another Guest's virtualized GPU memory. This issue, associated with CWE-270 (Permissions, Privileges, and Access Controls), carries a CVSS v3.1 base score of 7.9 (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to its potential for cross-VM impact.
A local attacker with low privileges in a compromised Guest VM can exploit this vulnerability, requiring low complexity and user interaction. Successful exploitation allows writing to another Guest's virtualized GPU memory, achieving high confidentiality and integrity impacts with a changed scope, enabling data corruption or exfiltration across VM isolation boundaries in multi-tenant setups.
Mitigation details are provided in the vendor advisory at https://www.imaginationtech.com/gpu-driver-vulnerabilities/, which likely includes patches or configuration guidance for affected GPU drivers and firmware in virtualized deployments.
Details
- CWE(s)