CyberWatch

LeftoverLocals GPU Leakage Vulnerability

By

By

Access Point Consulting

Summary

Vulnerability CVE-2023-4969, nicknamed LeftoverLocals, has been disclosed by Trail of Bits. It allows a local attacker to read memory from other processes. The attacker can use a vulnerable GPU’s (Graphical Processing Unit) programmable interface to access memory that is expected to be isolated from other users and processes. Trail of Bits has proven that a GPU kernel can observe memory values from a different GPU kernel even when both are isolated between two different applications.

Impact Assessment

This vulnerability requires that an attacker create and install an application to the victim machine to record a dump of memory from a leftover application. The memory dump may contain sensitive data. The attacker can also read data from another GPU kernel while it is currently processing data. This can lead to sensitive information being leaked.

Currently AMD, Android Open Source Project, Apple, Imagination Technologies, and Red Hat are all known to be affected by this vulnerability. There are announcements from AMD, Apple, and Imagination Technologies addressing this vulnerability for their GPUs.

What it means for you

If you are a user of any type of GPU, review vendor announcements for firmware/driver updates to remediate this vulnerability. This is especially true for users of Apple, AMD, and Android products as you most likely will use one of those three devices.

Remediation

AMD plans to roll out mitigation options beginning in March 2024 with Driver updates.

Imagination released a fix in their latest DDK release 23.3.

According to Trail of Bits, Apple provided confirmation that A17 and M3 series processors contain fixes.

Business Implications

Exploitation of this vulnerability can allow a local attacker to disclose sensitive data from other applications or GPU kernels. If attackers can install applications on a machine, they are more likely to be exploiting other processes. Therefore, this is unlikely to have much of an impact on business operations.

Access Point Technology Recommends

Update GPU driver: Patches are available from vendors for various GPU drivers for remediation.

Provide adequate access control: Proper controls are the best way to prevent vulnerabilities from being exploited. Deny access for local users to install applications on their own machine or from having access control to administrator privileges. If an attacker can install applications on a local machine, that’s an indication of foundational issues with your organization’s security.

Associated Bulletins

https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/

https://kb.cert.org/vuls/id/446598

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html

https://www.imaginationtech.com/gpu-driver-vulnerabilities/#jan24

https://github.com/trailofbits/LeftoverLocalsRelease

Resources

Trending Articles & Security Reports

Resources

CyberWatch

September 19, 2024

Stealing the Show: From Competitor to Threat Actor

In December 2020, Ticketmaster was hit with a $10 million fine for an act of corporate espionage. The company had engaged in unauthorized access to a competitor's computer systems, using stolen login credentials to gather confidential business intelligence. Although this scandal broke nearly four years ago, it serves as a reminder of the legal and ethical responsibilities businesses must adhere to in today’s marketplace.

Find out more
September 18, 2024

Adobe Patched Potential Zero-Day in Reader

Adobe released a patch for a suspected zero-day vulnerability in Adobe Reader, identified as CVE-2024-41869. This vulnerability, a Use After Free (UAF) issue, can lead to arbitrary code execution, system crashes, or the return of unexpected values.

Find out more
September 16, 2024

Why We Need NIST's Post-Quantum Cryptography Standards

Last month, NIST published its first set of post-quantum cryptography (PQC) standards, setting a new benchmark for enterprises, government agencies, and vendors to withstand future cyberattacks from quantum computers. The time to start transitioning is now. Discover what’s at stake with CyberWatch.

Find out more