EresusSecurity
Back to Research
Runtime Threats

LiteRT Delegation Core Execution Exploits

Mustafa DemircanJunior Pentester
April 10, 2026
Updated: April 27, 2026
5 min read

Overview

Modern Edge ML relies heavily on specialized hardware accelerators to run inference optimally without draining unit battery life. The LiteRT ecosystem achieves this massive performance boost by offloading computation to specialized hardware sub-programs termed Delegates. Delegates (such as Apple Core ML, Android NNAPI, Qualcomm Hexagon DSP, and dedicated GPU Delegates) act as deeply integrated translation layers mapping standard mathematical tensor operations directly into proprietary hardware instructions.

The PAIT-LITERT-302 classification isolates an extremely advanced architectural exploit actively weaponizing these hardware acceleration channels. Eresus Sentinel detects occurrences where maliciously crafted tensor parameters are embedded seamlessly within standard configuration operations. The vulnerability exists precisely because the secondary API layer (the specific Hardware Delegate) implicitly trusts the data passed fundamentally directly from the primary LiteRT pipeline. Attackers exploit this blind spot to bypass Android and iOS application-level sandbox constraints, crashing physical hardware configurations or establishing native root Remote Code Execution (RCE) at the system kernel driver level.

Hijacking the Delegation Vectors

Delegates fundamentally execute logic closely tied to the hardware kernel. By sending dimensionally corrupted logic variables that easily slip past the primary LiteRT validity checks, attackers inherently corrupt the subsequent processing state of the proprietary Vendor APIs. This causes undocumented memory behaviors directly translating into arbitrary operating system command execution spanning cleanly across edge devices.

How The Attack Works

Cybercriminals explicitly inject specific arithmetic exploits targeting structural flaws within the algorithmic hand-off mechanism.

sequenceDiagram
    participant Adversary
    participant LiteRT_Interpreter as LiteRT Parser
    participant Hardware_Delegate as Proprietary DSP / CoreML
    participant Kernel_Space as Host Operating System Driver

    Adversary->>Adversary: Embeds dimensional exploits tailored specifically for Hexagon DSP APIs
    Adversary->>LiteRT_Interpreter: App loads the poisoned `.tflite` model and spins up the Delegate
    LiteRT_Interpreter->>LiteRT_Interpreter: Validates generic dimensions but delegates advanced shapes blindly 
    LiteRT_Interpreter->>Hardware_Delegate: Submits variables wrapped in un-bounded memory loop instructions
    Hardware_Delegate->>Hardware_Delegate: Specialized OEM driver parses inputs without strict bounds-checking
    Hardware_Delegate->>Kernel_Space: The lack of validation triggers a memory segment overflow natively
    Kernel_Space-->>Adversary: Seamless root shell execution established globally overriding the application

Key Points

  • Implicit Trust Assumptions: The core of the vulnerability is the software validation gap. LiteRT inherently assumes that the device manufacturer's proprietary drivers will rigidly validate underlying inputs, while the OEM Delegate assumes LiteRT has already deeply sanitized the mathematical parameters. This creates an unregulated blind spot where malformed data executes unhindered.
  • Evading Baseline Validations: Foundational operations mathematically behave as intended inside the standard CPU interpreter. The exploit only triggers contextually when specific execution graphs are compiled exclusively for the targeted hardware accelerator—completely bypassing standard EDR validation engines scanning general CPU activities.
  • Manufacturer Driver Exploitation: Because individual Delegate implementations vary widely across manufacturers (Samsung vs. Apple vs. Qualcomm), cyberespionage actors can isolate and target extremely specific proprietary drivers, converting abstract data manipulation natively into zero-day kernel escalations.

Impact

Exploiting native hardware delegation translates to a total and absolute system compromise. By escaping the relatively sandboxed mobile application layer (Java/Kotlin/Swift) and executing directly inside the privileged device driver level, attackers gain terrifying raw memory access. This facilitates the extraction of secure device enclaves, biometric hashes, and cryptographic key stores while allowing for persistent, deeply hidden rootkit capabilities affecting a corporation's entire fleet of mobile endpoint computing resources.

Best Practices

  • Restrict Explicit API Delegates: Unless absolutely mission-critical for specific deployment infrastructure, strictly limit the usage of unverified or experimental external hardware delegates. Default to well-isolated CPU interpreters or generic GPU delegates when forcing operations analyzing untrusted community ML models.
  • Maintain Current Vendor Distributions: Actively update Android and iOS firmware architectures identically across the device fleet. Proprietary drivers supporting NNAPI and CoreML routinely receive unannounced, critical security backports explicitly shielding against hardware boundary overrides.
  • Monitor Peripheral Access Logic: Continually assess your mobile deployment configurations carefully, instituting zero-trust dimensional validity checks directly processing all input vectors specifically before building the native tensor logic mappings.

Remediation

Instantly investigating a PAIT-LITERT-302 detection means Eresus Sentinel has completely blocked an application configuration dynamically attempting to poison your physical edge routing configurations. Immediately isolate the device and physically terminate all background LiteRT operations structurally preventing the Delegate API from locking. Eliminate the flagged .tflite model from your content delivery network identically prioritizing a rollback to trusted internal assets manually signed by corporate engineers. Review OEM kernel logging actively ensuring no backdoor artifacts were spawned structurally prior to the intervention.

Further Reading

Enhance your operational threat hunting procedures natively resolving complex deployment architecture blind spots natively across varied hardware integrations:


📥 Eresus Sentinel Defends the Deepest Integration Bridges of Your Infrastructure An AI application shouldn't be the backdoor unlocking your proprietary hardware architectures natively. Eresus Sentinel mathematically validates the foundational parsing boundaries preventing the malicious manipulation of LiteRT Hardware Delegates flawlessly natively. We actively block anomalous structural tensor variables before they are forwarded accurately into proprietary DSP and CoreML processors safely preventing driver-level RCE payloads inherently automatically. Maintain uncompromised edge processing power effortlessly securely natively.

Learn more | Book a Demo

SSS

Bu risk sadece prompt injection ile mi sınırlı?

Hayır. AI güvenliğinde prompt injection önemli bir başlangıçtır ama tek başına resmi anlatmaz. Retrieval katmanı, tool izinleri, model artefact güveni, loglarda hassas veri, kullanıcı yetkisi ve entegrasyon sınırları birlikte değerlendirilmelidir.

İlk teknik kontrol ne olmalı?

Önce sistemin hangi veriye eriştiği, hangi aksiyonları alabildiği ve bu aksiyonların hangi kimlikle çalıştığı haritalanmalıdır. Bu harita olmadan yapılan test genellikle birkaç prompt denemesinden öteye geçemez.

Ne zaman profesyonel destek gerekir?

AI uygulaması müşteri verisine, iç dokümana, üretim API’lerine veya otomatik aksiyon alan agent akışlarına erişiyorsa profesyonel güvenlik incelemesi gerekir. Bu noktada risk artık model cevabı değil, kurum içi yetki ve veri sınırıdır.