Special Features

Cybersecurity Month

Arm patches GPU driver bug exploited by spyware to snoop on targets

As Qualcomm warns of similar fixes coming for its chips


Commercial spyware has exploited a security hole in Arm's Mali GPU drivers to compromise some people's devices, according to Google today.

These graphics processors are used in a ton of gear, from phones and tablets to laptops and cars, so the kernel-level vulnerability may be present in countless equipment. This includes Android handsets made by Google, Samsung, and others.

The vulnerable drivers are paired with Arm's Midgard (launched in 2010), Bifrost (2016), Valhall (2019), and fifth generation Mali GPUs (2023), so we imagine this buggy code will be in millions of systems.

On Monday, Arm issued an advisory for the flaw, which is tracked as CVE-2023-4211. This is a use-after-free bug affecting Midgard driver versions r12p0 to r32p0; Bifrost versions r0p0 to r42p0; Valhall versions r19p0 to r42p0; and Arm 5th Gen GPU Architecture versions r41p0 to r42p0.

We're told Arm has corrected the security blunder in its drivers for Bifrost to fifth-gen. "This issue is fixed in Bifrost, Valhall, and Arm 5th Gen GPU Architecture Kernel Driver r43p0," the advisory stated. "Users are recommended to upgrade if they are impacted by this issue. Please contact Arm support for Midgard GPUs."

We note version r43p0 of Arm's open source Mali drivers for Bifrost to fifth-gen were released in March. Midgard has yet to publicly get that version, it appears, hence why you need to contact Arm for that. We've asked Arm for more details on that.

What this means for the vast majority of people is: look out for operating system or manufacturer updates with Mali GPU driver fixes to install to close this security hole, or look up the open source drivers and apply updates yourself if you're into that. Your equipment may already be patched by now, given the release in late March, and details of the bug are only just coming out. If you're a device maker, you should be rolling out patches to customers.

"A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory," is how Arm described the bug. That, it seems, is enough to allow spyware to take hold of a targeted vulnerable device.

According to Arm there is "evidence that this vulnerability may be under limited, targeted exploitation." We've received confirmation from Google, whose Threat Analysis Group's (TAG) Maddie Stone and Google Project Zero's Jann Horn found and reported the vulnerability to the chip designer, that this targeted exploitation has indeed taken place. 

"At this time, TAG can confirm the CVE was used in the wild by a commercial surveillance vendor," a TAG spokesperson told The Register. "More technical details will be available at a later date, aligning with our vulnerability disclosure policy."

TAG is keeping quiet for now on who exactly is exploiting Mali's kernel drivers this time. It could perhaps be Pegasus or Predator maybe; the main point here is that attacks are likely to be against very specific targets, such as activists, journalists, or persons of interest to certain governments.

Also, for what it's worth, Arm on Monday also said it has patched a bunch of other exploitable GPU driver bugs that aren't credited to any researcher nor said to have been exploited: CVE-2023-33200, a race-condition fixed in Bifrost, Valhall and Arm 5th Gen GPU Architecture Kernel Driver r44p1 and r45p0; and CVE-2023-34970, a GPU operation issue fixed in Valhall and Arm 5th Gen GPU Architecture Kernel Driver r44p1 and r45p0.

Speaking of bugs under exploit…

Google highlighted CVE-2023-4211 in its October Android security bulletin, also published on Monday. That bulletin warned of "indications" that this particular Arm driver bug, as well as a critical system vulnerability, CVE-2023-4863, could lead to remote code execution again "under limited, targeted exploitation."

Meanwhile, Qualcomm, in a security bulletin published the same day cited intelligence from TAG and Project Zero that four additional vulnerabilities, CVE-2023-33106, CVE-2023-33107, CVE-2022-22071, and CVE-2023-33063 have also been exploited in targeted attacks. 

While it shared details about one of the four, CVE-2022-22071, in its May 2022 bulletin, Qualcomm says it won't be sharing any info about the other three until December 2023. This could be an unpleasant Christmas treat.

Here's all the details we have as of now: "Patches for the issues affecting [Qualcomm's] Adreno GPU and Compute DSP drivers have been made available, and OEMs have been notified with a strong recommendation to deploy security updates as soon as possible," the advisory stated. "Please contact your device manufacturer for more information on the patch status about specific devices."

It's worth noting that in 2022 Googlers uncovered a vulnerability tracked as CVE-2022-22706, also in Mali GPU kernel drivers, being used to deploy spyware developed by Spanish vendor Variston.

This particular firm has developed spyware called Heliconia that can exploit vulnerabilities in Chrome and Firefox browsers as well as Microsoft Defender security software. ®

Send us news
5 Comments

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday

China's APT41 crew adds a stealthy malware loader and fresh backdoor to its toolbox

Meet DodgeBox, son of StealthVector

Ransomware crews investing in custom data stealing malware

BlackByte, LockBit among the criminals using bespoke tools

'Gay furry hackers' say they've disbanded after raiding Project 2025's Heritage Foundation

Ultra-conservative org funnily enough not ready to turn the other cheek

You had a year to patch this Veeam flaw – and now it's going to hurt some more

LockBit variant targets backup software - which you may remember is supposed to help you recover from ransomware

Privacy expert put away for 9 years after 'grotesque' cyberstalking campaign

Scumbag targeted many victims – and those who tried to help them

Eldorado ransomware-as-a-service gang targets Linux, Windows systems

US orgs bear the brunt of attacks by probably-Russian crew

TeamViewer can't bring itself to say someone broke into its network – but it happened

Claims customer data, prod environment not affected as NCC sounds alarm

Big Tech's eventual response to my LLM-crasher bug report was dire

Fixes have been made, it appears, but disclosure or discussion is invisible

Copilot+ PCs software compatibility issues left to you to sort out, with help from crowdsourcers

Samsung warned users, but the PC industry’s big players hardly mention the possibility of problems

WhisperGate suspect indicted as US offers a $10M bounty for his capture

Russian national accused of attacks in lead-up to the Ukraine war

Feds put $5M bounty on 'CryptoQueen' Ruja Ignatova

OneCoin co-founder allegedly bilked investors out of $4B