INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2021-28663

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Arm Mali Graphics Processing Unit (GPU) Use-After-Free Vulnerability — Arm Mali Graphics Processing Unit (GPU) kernel driver contains a use-after-free vulnerability that may allow a non-privileged use
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Arm Mali Graphics Processing Unit (GPU) Use-After-Free Vulnerability — Arm Mali Graphics Processing Unit (GPU) kernel driver contains a use-after-free vulnerability that may allow a non-privileged user to make improper operations on GPU memory to gain root privilege, and/or disclose information.

🤖 AI Executive Summary

CVE-2021-28663 is a critical use-after-free vulnerability in Arm Mali GPU kernel drivers affecting Android and Linux-based devices. A non-privileged attacker can exploit this flaw to gain root privileges or disclose sensitive information. With CVSS 9.0 and publicly available exploits, this poses an immediate threat to Saudi mobile and IoT infrastructure.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 13:15
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability critically impacts Saudi telecommunications sector (STC, Mobily, Zain) affecting millions of Android devices. Government agencies using Mali GPU-equipped devices face privilege escalation risks. Healthcare sector (MOH systems), banking mobile applications, and ARAMCO's operational technology networks using ARM-based processors are at significant risk. Energy sector SCADA systems and critical infrastructure relying on ARM processors require immediate assessment.
🏢 Affected Saudi Sectors
Telecommunications (STC, Mobily, Zain) Government Agencies Healthcare (MOH) Banking and Financial Services Energy and Utilities (ARAMCO, SEC) Critical Infrastructure Defense and Military Education Transportation
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all devices with Arm Mali GPU drivers in your environment (Android devices, embedded Linux systems, IoT devices)
2. Disable GPU access for untrusted applications where operationally feasible
3. Implement application sandboxing and SELinux/AppArmor restrictions

PATCHING GUIDANCE:
1. Apply Arm Mali GPU driver security updates immediately (check device manufacturer for patches)
2. For Android devices: Update to latest security patch level from device manufacturer
3. For Linux systems: Update kernel and Mali driver packages from distribution repositories
4. Prioritize devices in critical infrastructure and customer-facing systems

COMPENSATING CONTROLS (if patch unavailable):
1. Restrict GPU access via kernel module parameters (disable_job_fault_handling)
2. Implement strict SELinux policies limiting GPU device access
3. Monitor /dev/mali* device access and GPU memory operations
4. Disable GPU acceleration in non-critical applications

DETECTION RULES:
1. Monitor for unusual GPU memory access patterns and use-after-free indicators
2. Alert on privilege escalation attempts from GPU processes
3. Track failed GPU driver operations and kernel panics
4. Monitor /proc/[pid]/maps for GPU memory mapping anomalies
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع الأجهزة التي تحتوي على برامج تشغيل Arm Mali GPU في بيئتك (أجهزة Android والأنظمة المدمجة وأجهزة إنترنت الأشياء)
2. تعطيل وصول GPU للتطبيقات غير الموثوقة حيث يكون ذلك ممكنًا من الناحية التشغيلية
3. تنفيذ عزل التطبيقات وقيود SELinux/AppArmor

إرشادات التصحيح:
1. تطبيق تحديثات أمان برنامج تشغيل Arm Mali GPU على الفور
2. لأجهزة Android: التحديث إلى أحدث مستوى تصحيح أمان من الشركة المصنعة
3. لأنظمة Linux: تحديث نواة النظام وحزم برنامج التشغيل من مستودعات التوزيع
4. إعطاء الأولوية للأجهزة في البنية التحتية الحرجة والأنظمة الموجهة للعملاء

الضوابط البديلة:
1. تقييد وصول GPU عبر معاملات وحدة النواة
2. تنفيذ سياسات SELinux صارمة تحد من وصول جهاز GPU
3. مراقبة وصول جهاز /dev/mali* وعمليات ذاكرة GPU
4. تعطيل تسريع GPU في التطبيقات غير الحرجة

قواعد الكشف:
1. مراقبة أنماط وصول ذاكرة GPU غير العادية
2. التنبيه على محاولات تصعيد الامتيازات من عمليات GPU
3. تتبع فشل عمليات برنامج التشغيل وأعطال النواة
4. مراقبة شذوذ تعيين ذاكرة GPU
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies (GPU device access restrictions) ECC 2024 A.8.1.1 - User Endpoint Devices (Android/mobile device security) ECC 2024 A.8.2.1 - Privileged Access Rights (privilege escalation prevention) ECC 2024 A.8.2.3 - Access Restriction and Secret Management (GPU memory protection)
🔵 SAMA CSF
ID.AM-2 - Asset Management (inventory Mali GPU devices) PR.AC-1 - Access Control (GPU device access policies) PR.PT-1 - Protection Processes (kernel hardening, SELinux) DE.CM-1 - Detection and Analysis (GPU memory monitoring) RS.MI-1 - Incident Mitigation (privilege escalation response)
🟡 ISO 27001:2022
A.5.1.1 - Policies for information security (GPU security policy) A.6.1.1 - Information security roles and responsibilities A.8.1.1 - User endpoint devices (mobile device management) A.8.2.1 - Privileged access rights (principle of least privilege) A.8.3.1 - Password management (credential protection from GPU exploits)
🟣 PCI DSS v4.0
Requirement 1.1 - Firewall configuration (restrict GPU access) Requirement 2.1 - Default security parameters (disable unnecessary GPU features) Requirement 6.2 - Security patches (Mali driver updates) Requirement 8.1 - User identification and authentication (prevent privilege escalation)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Arm:Mali Graphics Processing Unit (GPU)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS2.42%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2021-11-17
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.