Cyber Posture

CVE-2025-25176

Critical

Published: 13 January 2026

Published
13 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0005 15.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25176 is a critical-severity Exposure of Resource to Wrong Sphere (CWE-668) vulnerability in Imaginationtech Ddk. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 15.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prevents unauthorized information transfer via shared system resources such as GPU registers accessible by both secure workloads and non-secure applications.

prevent

Enforces information flow control policies to block exfiltration of sensitive intermediate register values from secure to non-secure environments.

prevent

Mandates enforcement of access authorizations to restrict non-secure applications from accessing secure workload register values.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability enables remote exploitation to access/exfil sensitive register data from secure GPU workloads (T1005) via network-accessible driver interfaces (T1190).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Intermediate register values of secure workloads can be exfiltrated in workloads scheduled from applications running in the non-secure environment of a platform.

Deeper analysisAI

CVE-2025-25176 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) in GPU drivers from Imagination Technologies, published on 2026-01-13. It enables the exfiltration of intermediate register values from secure workloads when those workloads are scheduled by applications running in the non-secure environment of a platform. The issue is classified under CWE-668 (Exposure of Resource to Wrong Sphere).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. By scheduling workloads from a non-secure application, they can access and exfiltrate sensitive intermediate register values from secure workloads, resulting in high confidentiality and integrity impacts without affecting availability.

Mitigation details are available in the vendor advisory at https://www.imaginationtech.com/gpu-driver-vulnerabilities/.

Details

CWE(s)

Affected Products

imaginationtech
ddk
≤ 25.3

CVEs Like This One

CVE-2026-22163Same product: Imaginationtech Ddk
CVE-2025-10865Same product: Imaginationtech Ddk
CVE-2025-58411Same product: Imaginationtech Ddk
CVE-2026-21732Same product: Imaginationtech Ddk
CVE-2025-13952Same product: Imaginationtech Ddk
CVE-2026-20160Shared CWE-668
CVE-2026-30912Shared CWE-668
CVE-2026-34217Shared CWE-668
CVE-2026-33573Shared CWE-668
CVE-2026-39911Shared CWE-668

References