INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 27m Global vulnerability Information Technology / Software Infrastructure CRITICAL 29m Global data_breach Healthcare CRITICAL 45m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 27m Global vulnerability Information Technology / Software Infrastructure CRITICAL 29m Global data_breach Healthcare CRITICAL 45m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 27m Global vulnerability Information Technology / Software Infrastructure CRITICAL 29m Global data_breach Healthcare CRITICAL 45m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h
Vulnerabilities

CVE-2021-28664

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Arm Mali Graphics Processing Unit (GPU) Unspecified Vulnerability — Arm Mali Graphics Processing Unit (GPU) kernel driver contains an unspecified vulnerability that may allow a non-privileged user to
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Arm Mali Graphics Processing Unit (GPU) Unspecified Vulnerability — Arm Mali Graphics Processing Unit (GPU) kernel driver contains an unspecified vulnerability that may allow a non-privileged user to gain write access to read-only memory, gain root privilege, corrupt memory, and modify the memory of other processes.

🤖 AI Executive Summary

CVE-2021-28664 is a critical vulnerability in Arm Mali GPU kernel drivers affecting multiple Android and embedded devices across Saudi Arabia. The flaw allows unprivileged users to gain write access to read-only memory, escalate to root privileges, and corrupt system memory. With active exploits available and widespread Mali GPU adoption in consumer and enterprise devices, immediate patching is essential to prevent privilege escalation attacks.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 13:18
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi telecommunications sector (STC, Mobily, Zain) as Mali GPUs are prevalent in Android devices and IoT infrastructure. Government agencies and NCA-regulated entities using Android-based systems face privilege escalation risks. Banking sector (SAMA-regulated institutions) could be impacted if Mali GPU devices are used in payment terminals or mobile banking infrastructure. Healthcare organizations using Android medical devices and ARAMCO's operational technology networks utilizing embedded systems with Mali GPUs are at elevated risk. The exploit availability increases threat likelihood across all sectors.
🏢 Affected Saudi Sectors
Telecommunications (STC, Mobily, Zain) Government and Public Administration Banking and Financial Services (SAMA-regulated) Healthcare Energy and Utilities (ARAMCO) Retail and E-commerce Education IoT and Embedded Systems Providers
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all devices using Arm Mali GPU drivers in your infrastructure (Android devices, IoT systems, embedded systems)
2. Prioritize patching of devices in critical infrastructure and payment systems
3. Implement network segmentation to limit unprivileged user access to sensitive systems
4. Enable SELinux/AppArmor with strict policies to restrict kernel module exploitation

Patching Guidance:
1. Apply Arm Mali GPU kernel driver updates from device manufacturers (Samsung, Qualcomm, MediaTek)
2. For Android devices: Update to latest security patch level (check device manufacturer security bulletins)
3. For embedded systems: Contact OEM for Mali GPU driver updates
4. Test patches in non-production environments before deployment

Compensating Controls (if patch unavailable):
1. Restrict application installation to trusted sources only
2. Disable USB debugging and developer options on all devices
3. Implement strict application whitelisting policies
4. Monitor for suspicious kernel module loading attempts
5. Restrict unprivileged user account capabilities using Linux capabilities framework

Detection Rules:
1. Monitor for ioctl calls to Mali GPU driver with suspicious parameters
2. Alert on unexpected privilege escalation from unprivileged processes
3. Track kernel module loading events, especially Mali-related modules
4. Monitor memory access patterns for write operations to read-only regions
5. Implement kernel audit logging for GPU driver interactions
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع الأجهزة التي تستخدم برامج تشغيل Arm Mali GPU في البنية التحتية الخاصة بك (أجهزة Android وأنظمة IoT والأنظمة المدمجة)
2. إعطاء الأولوية لتصحيح الأجهزة في البنية التحتية الحرجة وأنظمة الدفع
3. تنفيذ تقسيم الشبكة لتحديد وصول المستخدمين غير المميزين إلى الأنظمة الحساسة
4. تفعيل SELinux/AppArmor بسياسات صارمة لتقييد استغلال وحدات النواة

إرشادات التصحيح:
1. تطبيق تحديثات برامج تشغيل نواة Arm Mali GPU من مصنعي الأجهزة (Samsung و Qualcomm و MediaTek)
2. لأجهزة Android: التحديث إلى أحدث مستوى تصحيح أمان (تحقق من نشرات الأمان الخاصة بمصنع الجهاز)
3. للأنظمة المدمجة: اتصل بالمصنع الأصلي للحصول على تحديثات برامج تشغيل Mali GPU
4. اختبر التصحيحات في بيئات غير الإنتاج قبل النشر

الضوابط البديلة (إذا لم يكن التصحيح متاحًا):
1. تقييد تثبيت التطبيقات على المصادر الموثوقة فقط
2. تعطيل تصحيح أخطاء USB وخيارات المطورين على جميع الأجهزة
3. تنفيذ سياسات إدراج التطبيقات البيضاء الصارمة
4. مراقبة محاولات تحميل وحدات النواة المريبة
5. تقييد قدرات حساب المستخدم غير المميز باستخدام إطار عمل قدرات Linux

قواعد الكشف:
1. مراقبة استدعاءات ioctl لبرنامج تشغيل Mali GPU بمعاملات مريبة
2. تنبيه على تصعيد امتيازات غير متوقع من العمليات غير المميزة
3. تتبع أحداث تحميل وحدات النواة، خاصة الوحدات المتعلقة بـ Mali
4. مراقبة أنماط الوصول إلى الذاكرة لعمليات الكتابة إلى المناطق المحمية من القراءة فقط
5. تنفيذ تسجيل تدقيق النواة لتفاعلات برنامج تشغيل GPU
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies ECC 2024 A.5.2.1 - User Registration and Access Rights Management ECC 2024 A.8.1.1 - Information Security Awareness and Training ECC 2024 A.12.2.1 - Change Management ECC 2024 A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
SAMA CSF ID.BE-1 - Asset Management SAMA CSF PR.AC-1 - Access Control SAMA CSF PR.PT-2 - Security Patches and Updates SAMA CSF DE.CM-8 - Vulnerability Scanning
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access Control ISO 27001:2022 A.8.1 - Information Security Policies ISO 27001:2022 A.12.6.1 - Management of Technical Vulnerabilities ISO 27001:2022 A.14.2.1 - Secure Development Policy
🟣 PCI DSS v4.0
PCI DSS 6.2 - Security Patches PCI DSS 11.2 - Vulnerability Scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Arm:Mali Graphics Processing Unit (GPU)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.14%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2021-11-17
Published 2021-11-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.