CVE-2026-21733
Published: 17 April 2026
Summary
CVE-2026-21733 is a high-severity Improper Input Validation (CWE-20) vulnerability in Imaginationtech (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and remediation of the graphics DDK vulnerability via patching as specified in the vendor advisory.
Enforces least privilege to restrict low-privilege (PR:L) local user access to vulnerable graphics driver interfaces and resources.
Requires secure configuration settings for the Imagination Technologies Graphics DDK to mitigate exploitation of the local vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local low-privilege exploit in graphics driver with high C/I impact directly enables privilege escalation via kernel/driver code execution.
NVD Description
Vulnerability in Imagination Technologies Graphics DDK on Linux, Android -- RESERVED
Deeper analysisAI
CVE-2026-21733 is a vulnerability affecting the Imagination Technologies Graphics DDK on Linux and Android platforms. Published on 2026-04-17T17:16:35.220, it has a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), indicating high severity with local attack vector, low attack complexity, and low privileges required.
A local attacker with low privileges can exploit this vulnerability without user interaction. Successful exploitation enables high-impact confidentiality and integrity violations, alongside low availability impact, potentially allowing unauthorized data access or modification within the affected graphics driver context.
Mitigation details are available in the vendor advisory at https://www.imaginationtech.com/gpu-driver-vulnerabilities/.
Details
- CWE(s)