{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-58407","assignerOrgId":"367425dc-4d06-4041-9650-c2dc6aaa27ce","state":"PUBLISHED","assignerShortName":"imaginationtech","dateReserved":"2025-09-01T08:00:07.348Z","datePublished":"2025-11-17T17:18:18.831Z","dateUpdated":"2025-11-17T17:35:06.099Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux","Android"],"product":"Graphics DDK","vendor":"Imagination Technologies","versions":[{"status":"unaffected","version":"25.1 RTM2","versionType":"custom"},{"status":"affected","version":"25.2 RTM1","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(240, 241, 242);\">Kernel or driver software installed on a Guest VM may post improper commands to the GPU Firmware to exploit a TOCTOU race condition and trigger a read and/or write of data outside the allotted memory escaping the virtual machine.</span>\n\n<br>"}],"value":"Kernel or driver software installed on a Guest VM may post improper commands to the GPU Firmware to exploit a TOCTOU race condition and trigger a read and/or write of data outside the allotted memory escaping the virtual machine."}],"impacts":[{"capecId":"CAPEC-480","descriptions":[{"lang":"en","value":"CAPEC - CAPEC-480: Escaping Virtualization (Version 3.9)"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-367","description":"CWE - CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition (4.18)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"367425dc-4d06-4041-9650-c2dc6aaa27ce","shortName":"imaginationtech","dateUpdated":"2025-11-17T17:18:18.831Z"},"references":[{"url":"https://www.imaginationtech.com/gpu-driver-vulnerabilities/"}],"source":{"discovery":"UNKNOWN"},"title":"GPU DDK - TOCTOU bug affecting psFWMemContext->uiPageCatBaseRegSet","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.4,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-11-17T17:34:51.900178Z","id":"CVE-2025-58407","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-17T17:35:06.099Z"}}]}}