The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-4969

CVE-2023-4969: Khronos OpenCL Information Disclosure Flaw

CVE-2023-4969 is an information disclosure vulnerability in Khronos OpenCL allowing GPU kernels to read sensitive data from other kernels via local memory. This article covers technical details, affected systems, and mitigations.

Published: February 11, 2026

CVE-2023-4969 Overview

CVE-2023-4969, commonly referred to as "LeftoverLocals," is a memory leak vulnerability affecting GPU architectures across multiple vendors. A GPU kernel can read sensitive data from another GPU kernel—including data from different users or applications—through an optimized GPU memory region called local memory. This vulnerability exists across OpenCL, Vulkan, and various GPU hardware implementations, affecting both consumer and professional graphics cards as well as integrated graphics in modern processors.

Critical Impact

An authenticated local attacker can exploit improper memory clearing in GPU local memory to extract sensitive data processed by other users or applications on shared GPU resources, potentially exposing cryptographic keys, machine learning model weights, or other confidential information.

Affected Products

  • Khronos OpenCL (all versions)
  • Khronos Vulkan (all versions)
  • Imagination Technologies DDK (all versions)
  • AMD Instinct MI Series (MI100, MI210, MI250, MI300A, MI300X)
  • AMD Radeon RX 5000/6000/7000 Series
  • AMD Radeon Pro Series (W5500X, W5700X, W6300M, W6400, W6500M, W7500, W7600, V520, V620)
  • AMD Ryzen 3000/4000/5000/6000/7000 Series APUs with integrated graphics
  • AMD Athlon 3000G

Discovery Timeline

  • January 16, 2024 - CVE-2023-4969 published to NVD
  • June 20, 2025 - Last updated in NVD database

Technical Details for CVE-2023-4969

Vulnerability Analysis

This vulnerability stems from improper memory management in GPU local memory—a high-performance memory region optimized for fast access by compute units within a GPU. When GPU kernels allocate and use local memory for computations, the underlying hardware and driver implementations fail to properly clear or isolate this memory between different kernel executions or between different users sharing the same GPU hardware.

The issue is particularly concerning in multi-tenant environments such as cloud computing platforms, where multiple users may share the same physical GPU. An attacker can craft a malicious GPU kernel that allocates local memory and reads its contents before using it, potentially recovering data left behind by a previous kernel execution from a different process or user.

The vulnerability affects applications utilizing GPU compute frameworks including OpenCL and Vulkan compute shaders. Modern workloads that process sensitive data on GPUs—such as machine learning inference, cryptographic operations, and scientific computing—are at particular risk of data exposure through this vulnerability.

Root Cause

The root cause of CVE-2023-4969 is a memory leak weakness (CWE-401) in GPU local memory handling. GPU architectures optimize for performance by not zeroing local memory allocations between kernel executions. While the OpenCL and Vulkan specifications technically define local memory contents as undefined upon allocation, this creates a practical security vulnerability when sensitive data persists in this memory region.

The specifications state that applications should not rely on initial memory contents, but they do not mandate that implementations prevent information disclosure. This specification gap, combined with the performance-driven design decision to skip memory clearing, creates the vulnerability condition.

Attack Vector

Exploitation requires local access to the system with the ability to execute GPU kernels. An attacker must:

  1. Have authenticated access to the system with permission to submit GPU workloads
  2. Allocate local memory in a GPU kernel without initializing it
  3. Read and exfiltrate the memory contents, which may contain residual data from previous kernel executions
  4. Repeat the process to capture data from victim workloads running on the same GPU

The attack is timing-dependent, as the attacker must execute their kernel after the victim's kernel has written sensitive data to local memory but before other operations overwrite that data. In practice, a persistent polling approach can reliably capture sensitive data over time.

The vulnerability mechanism involves crafting a GPU compute shader or OpenCL kernel that allocates local memory without initialization and then copies those contents to an output buffer for analysis. For detailed technical exploitation techniques, refer to the CERT Vulnerability Note VU#446598.

Detection Methods for CVE-2023-4969

Indicators of Compromise

  • Unusual GPU kernel submissions from unexpected processes or users
  • GPU compute workloads that allocate local memory, perform minimal computation, and immediately copy memory contents to host-accessible buffers
  • Repeated rapid GPU kernel executions with patterns consistent with memory scanning behavior
  • Anomalous data transfer patterns from GPU memory to host memory

Detection Strategies

  • Monitor GPU command queue submissions for kernels with suspicious allocation and copy patterns
  • Implement behavioral analysis for GPU workloads that exhibit memory scanning characteristics
  • Track GPU resource utilization anomalies that may indicate exploitation attempts
  • Deploy endpoint detection solutions capable of monitoring GPU driver interactions

Monitoring Recommendations

  • Enable GPU driver logging where supported to capture kernel submission patterns
  • Monitor shared GPU environments (cloud, virtualized) for unauthorized compute workloads
  • Implement resource isolation monitoring to detect potential cross-tenant data access attempts

How to Mitigate CVE-2023-4969

Immediate Actions Required

  • Update GPU drivers to the latest versions from AMD and other affected vendors
  • In multi-tenant environments, evaluate GPU isolation options or consider disabling GPU sharing until patches are available
  • Review applications processing sensitive data on GPUs and assess exposure risk
  • Consider implementing application-level memory initialization for critical workloads

Patch Information

Remediation for CVE-2023-4969 requires updates at multiple levels:

  1. GPU Driver Updates: AMD and other vendors have released or are releasing driver updates that implement local memory clearing between kernel executions
  2. Firmware Updates: For AMD hardware, firmware updates are available for affected Instinct, Radeon, and Ryzen products
  3. API Specification Updates: The Khronos Group has updated guidance in the OpenCL 3.0 API Specification and Vulkan 1.3 Extensions Specification

Consult vendor security advisories for specific patch versions and update procedures.

Workarounds

  • Initialize all local memory allocations to zero at the start of GPU kernels to prevent reading stale data
  • Avoid processing highly sensitive data on shared GPU resources in multi-tenant environments
  • Implement process isolation for GPU workloads handling sensitive information where possible
  • Clear GPU local memory by executing zeroing kernels after sensitive operations complete
bash
# Example: Check AMD GPU driver version on Linux
amdgpu-pro-info 2>/dev/null || clinfo | grep -i "driver version"

# Verify GPU firmware version
cat /sys/class/drm/card0/device/gpu_firmware_version 2>/dev/null

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechKhronos Opencl

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability2.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-401
  • Technical References
  • CERT Vulnerability ID #446598

  • OpenCL 3.0 API Specification

  • CERT Vulnerability ID #446598
  • Vendor Resources
  • Trail of Bits Blog

  • Vulkan 1.3 Extensions Specification
  • Latest CVEs
  • CVE-2025-52479: HTTP.jl & URIs.jl CRLF Injection Flaw

  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31743: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31744: Linux Kernel NULL Pointer Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English