CVE-2025-25176
Published: 13 January 2026
Summary
CVE-2025-25176 is a critical-severity Exposure of Resource to Wrong Sphere (CWE-668) vulnerability in Imaginationtech Ddk. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 15.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Prevents unauthorized information transfer via shared system resources such as GPU registers accessible by both secure workloads and non-secure applications.
Enforces information flow control policies to block exfiltration of sensitive intermediate register values from secure to non-secure environments.
Mandates enforcement of access authorizations to restrict non-secure applications from accessing secure workload register values.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables remote exploitation to access/exfil sensitive register data from secure GPU workloads (T1005) via network-accessible driver interfaces (T1190).
NVD Description
Intermediate register values of secure workloads can be exfiltrated in workloads scheduled from applications running in the non-secure environment of a platform.
Deeper analysisAI
CVE-2025-25176 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) in GPU drivers from Imagination Technologies, published on 2026-01-13. It enables the exfiltration of intermediate register values from secure workloads when those workloads are scheduled by applications running in the non-secure environment of a platform. The issue is classified under CWE-668 (Exposure of Resource to Wrong Sphere).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. By scheduling workloads from a non-secure application, they can access and exfiltrate sensitive intermediate register values from secure workloads, resulting in high confidentiality and integrity impacts without affecting availability.
Mitigation details are available in the vendor advisory at https://www.imaginationtech.com/gpu-driver-vulnerabilities/.
Details
- CWE(s)