CVE-2026-22165
Unknown · GPU GLES Library
A use-after-free (UAF) vulnerability in the GPU GLES user-space shared library can be triggered by malicious WebGPU content.
Executive summary
A use-after-free vulnerability in the GPU GLES shared library could allow an attacker to trigger crashes or potentially execute code via malicious web content.
Vulnerability
The vulnerability is a write use-after-free (UAF) crash condition occurring within the GPU GLES user-space shared library. It is triggered when processing specifically crafted WebGPU content, which may lead to memory corruption within the rendering process.
Business impact
A CVSS score of 8.1 highlights the critical nature of this flaw, as it can be weaponized through web browsers to achieve remote code execution. This poses a severe risk to end-user workstations, potentially leading to unauthorized data exfiltration or system takeover.
Remediation
Immediate Action: Ensure that all web browsers and associated GPU drivers are updated to the latest versions provided by the vendor.
Proactive Monitoring: Utilize endpoint detection and response (EDR) solutions to monitor for suspicious process crashes or anomalous memory access patterns in web browser renderers.
Compensating Controls: Use browser-based security features or extensions that restrict execution of WebGPU content from untrusted domains.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should prioritize the update of browser environments and graphics drivers to mitigate this high-severity UAF vulnerability. Immediate patching is recommended to prevent potential exploitation via malicious web-based content.