CyberWatch

LeftoverLocals GPU Leakage Vulnerability

By

By

Access Point Consulting

Summary

Vulnerability CVE-2023-4969, nicknamed LeftoverLocals, has been disclosed by Trail of Bits. It allows a local attacker to read memory from other processes. The attacker can use a vulnerable GPU’s (Graphical Processing Unit) programmable interface to access memory that is expected to be isolated from other users and processes. Trail of Bits has proven that a GPU kernel can observe memory values from a different GPU kernel even when both are isolated between two different applications.

Impact Assessment

This vulnerability requires that an attacker create and install an application to the victim machine to record a dump of memory from a leftover application. The memory dump may contain sensitive data. The attacker can also read data from another GPU kernel while it is currently processing data. This can lead to sensitive information being leaked.

Currently AMD, Android Open Source Project, Apple, Imagination Technologies, and Red Hat are all known to be affected by this vulnerability. There are announcements from AMD, Apple, and Imagination Technologies addressing this vulnerability for their GPUs.

What it means for you

If you are a user of any type of GPU, review vendor announcements for firmware/driver updates to remediate this vulnerability. This is especially true for users of Apple, AMD, and Android products as you most likely will use one of those three devices.

Remediation

AMD plans to roll out mitigation options beginning in March 2024 with Driver updates.

Imagination released a fix in their latest DDK release 23.3.

According to Trail of Bits, Apple provided confirmation that A17 and M3 series processors contain fixes.

Business Implications

Exploitation of this vulnerability can allow a local attacker to disclose sensitive data from other applications or GPU kernels. If attackers can install applications on a machine, they are more likely to be exploiting other processes. Therefore, this is unlikely to have much of an impact on business operations.

Access Point Technology Recommends

Update GPU driver: Patches are available from vendors for various GPU drivers for remediation.

Provide adequate access control: Proper controls are the best way to prevent vulnerabilities from being exploited. Deny access for local users to install applications on their own machine or from having access control to administrator privileges. If an attacker can install applications on a local machine, that’s an indication of foundational issues with your organization’s security.

Associated Bulletins

https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/

https://kb.cert.org/vuls/id/446598

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html

https://www.imaginationtech.com/gpu-driver-vulnerabilities/#jan24

https://github.com/trailofbits/LeftoverLocalsRelease

Resources

Trending Articles & Security Reports

Resources

CyberWatch

November 22, 2024

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

On this episode of the CyberWatch podcast, there are updates to software across the application and OS spectrum. New malicious campaigns are threatening victims of all sizes, and researchers have performed dissections on malware to give defenders new clues about just what it is they're fighting. All this today, in CyberWatch.

Find out more
October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Find out more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Find out more