CVE-2023-4211 — Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
Published
2023-10-01T17:00:27.113Z
Last modified
2025-10-21T23:05:36.029Z
CISA KEV — Actively Exploited
01What is this vulnerability?
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
02Affected products
| Vendor | Product | Versions |
|---|
| Arm Ltd | Midgard GPU Kernel Driver | r12p0 |
| Arm Ltd | Bifrost GPU Kernel Driver | r0p0 |
| Arm Ltd | Valhall GPU Kernel Driver | r19p0 |
| Arm Ltd | Arm 5th Gen GPU Architecture Kernel Driver | r41p0 |
03Active exploitation status
Yes — actively exploited. Added to the CISA KEV catalog on 2023-10-03. Ransomware use: Unknown.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2023-10-01T17:00:27.113Z
- Last modified: 2025-10-21T23:05:36.029Z
- Added to CISA KEV: 2023-10-03
- BOD 22-01 due: 2023-10-24
09References
- developer.arm.com — https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerab…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →