CVE-2026-22163
Arbitrary Memory Write via GPU IOCTL in DDK Kernel Module
Publication date: 2026-03-20
Last updated on: 2026-04-21
Assigner: imaginationtech
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| imaginationtech | ddk | 24.2 |
| imaginationtech | ddk | From 25.1 (inc) to 25.3 (inc) |
| imaginationtech | ddk | 1.17 |
| imaginationtech | ddk | 1.18 |
| imaginationtech | ddk | 23.2 |
| imaginationtech | ddk | 24.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-820 | The product utilizes a shared resource in a concurrent manner but does not attempt to synchronize access to the resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the misuse of the DDK kernel module IOCTL interface by malware code. The interface can be exploited in an unsupported way that allows the GPU to be subverted to perform writes to arbitrary physical memory pages. Additionally, the product uses a shared resource concurrently without synchronizing access, which contributes to the vulnerability.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could potentially write to arbitrary physical memory pages via the GPU, which may lead to unauthorized modification of system memory. This can result in system instability, data corruption, privilege escalation, or execution of malicious code.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know