CVE-2022-21819
📋 TL;DR
This vulnerability in NVIDIA Jetson Linux allows an unprivileged attacker with physical access to bypass IOMMU protections and gain direct read/write access to the entire system memory through PCI bus DMA attacks. This affects all NVIDIA Jetson devices running vulnerable versions of Jetson Linux. The attack requires physical access to the device.
💻 Affected Systems
- NVIDIA Jetson AGX Xavier
- NVIDIA Jetson Xavier NX
- NVIDIA Jetson TX2
- NVIDIA Jetson Nano
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including arbitrary code execution, privilege escalation, data theft/modification, and persistent denial of service.
Likely Case
Physical attacker gains full system control, can install persistent malware, extract sensitive data, or render device unusable.
If Mitigated
With proper physical security controls, risk is limited to authorized personnel with physical access.
🎯 Exploit Status
Exploitation requires physical hardware access and PCI/PCIe device connection. Public proof-of-concept demonstrates DMA attack methodology.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Jetson Linux 32.7.2 and later
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5321
Restart Required: Yes
Instructions:
1. Download Jetson Linux 32.7.2 or later from NVIDIA Developer site. 2. Flash the new image to the Jetson device using NVIDIA SDK Manager or command-line tools. 3. Verify the update completed successfully.
🔧 Temporary Workarounds
Physical Security Controls
allRestrict physical access to devices and PCI/PCIe connectors
Disable Unused PCI/PCIe Slots
linuxDisable PCI/PCIe slots in BIOS/UEFI if not needed
Access BIOS/UEFI settings during boot and disable unused PCI/PCIe slots
🧯 If You Can't Patch
- Implement strict physical security controls and access monitoring
- Disconnect or physically secure all PCI/PCIe expansion slots and connectors
🔍 How to Verify
Check if Vulnerable:
Check Jetson Linux version: cat /etc/nv_tegra_release | head -1
Check Version:
cat /etc/nv_tegra_release | head -1
Verify Fix Applied:
Verify version is 32.7.2 or later: cat /etc/nv_tegra_release | grep -q 'R32 (release), REVISION: 7.2' && echo 'Patched'
📡 Detection & Monitoring
Log Indicators:
- Unexpected PCI/PCIe device connections
- DMA-related kernel errors
- Unauthorized physical access events
Network Indicators:
- None - this is a physical access attack
SIEM Query:
Search for physical access logs, PCI device connection events, or DMA-related kernel errors
🔗 References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5321
- https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/
- https://nvidia.custhelp.com/app/answers/detail/a_id/5321
- https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/