CVE-2024-47899
Published: 31 January 2025
Summary
CVE-2024-47899 is a high-severity Use After Free (CWE-416) vulnerability in Imaginationtech (inferred from references). Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 31.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and CM-7 (Least Functionality).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the use-after-free vulnerability in Imagination Technologies GPU drivers by requiring timely patching and flaw correction.
Prevents non-privileged users from installing software that issues improper GPU system calls, blocking the primary exploitation vector.
Restricts GPU driver functionality to essential capabilities only, prohibiting non-essential features that enable triggering kernel exceptions via improper calls.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local use-after-free in GPU kernel driver directly enables privilege escalation via exploitation (T1068) and kernel-crash DoS (T1499.004).
NVD Description
Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions.
Deeper analysisAI
CVE-2024-47899 is a use-after-free (CWE-416) vulnerability in GPU drivers developed by Imagination Technologies. It arises when software installed and executed as a non-privileged user issues improper GPU system calls, triggering kernel exceptions. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability within a local scope.
A local attacker with low privileges, such as a non-privileged user on the system, can exploit this flaw with low complexity and no user interaction required. Successful exploitation allows the attacker to trigger use-after-free conditions in the kernel, potentially leading to arbitrary code execution, privilege escalation, or system denial of service through kernel crashes.
Imagination Technologies has published details on mitigations in their GPU driver vulnerabilities advisory at https://www.imaginationtech.com/gpu-driver-vulnerabilities/, which security practitioners should consult for patch availability, updated driver versions, and recommended remediation steps.
Details
- CWE(s)