CVE-2026-21736

Published: Mar 09, 2026 Last Modified: Mar 10, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,4
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none

Description

AI Translation Available

Software installed and run as a non-privileged user may conduct improper GPU system calls to gain write permission to read-only wrapped user-mode memory.

This is caused by improper handling of the memory protections for the user-mode wrapped memory resource.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0000
Percentile
0,0th
Updated

EPSS Score Trend (Last 6 Days)

280

Improper Handling of Insufficient Permissions or Privileges

Draft
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Other Alter Execution Logic
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Ddk by Imaginationtech

cpe:2.3:a:imaginationtech:ddk:25.1:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Ddk by Imaginationtech

cpe:2.3:a:imaginationtech:ddk:25.1:rtm2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.imaginationtech.com/gpu-driver-vulnerabilities/