CVE-2026-22165

Unknown · GPU GLES Library

A use-after-free (UAF) vulnerability in the GPU GLES user-space shared library can be triggered by malicious WebGPU content.

Executive summary

A use-after-free vulnerability in the GPU GLES shared library could allow an attacker to trigger crashes or potentially execute code via malicious web content.

Vulnerability

The vulnerability is a write use-after-free (UAF) crash condition occurring within the GPU GLES user-space shared library. It is triggered when processing specifically crafted WebGPU content, which may lead to memory corruption within the rendering process.

Business impact

A CVSS score of 8.1 highlights the critical nature of this flaw, as it can be weaponized through web browsers to achieve remote code execution. This poses a severe risk to end-user workstations, potentially leading to unauthorized data exfiltration or system takeover.

Remediation

Immediate Action: Ensure that all web browsers and associated GPU drivers are updated to the latest versions provided by the vendor.

Proactive Monitoring: Utilize endpoint detection and response (EDR) solutions to monitor for suspicious process crashes or anomalous memory access patterns in web browser renderers.

Compensating Controls: Use browser-based security features or extensions that restrict execution of WebGPU content from untrusted domains.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should prioritize the update of browser environments and graphics drivers to mitigate this high-severity UAF vulnerability. Immediate patching is recommended to prevent potential exploitation via malicious web-based content.