CVE-2023-0200

7.5 HIGH

📋 TL;DR

This vulnerability in NVIDIA DGX-2 systems allows authenticated users with high privileges to exploit a heap-based buffer overflow in the OFBD component. Successful exploitation could lead to arbitrary code execution, privilege escalation, denial of service, or information disclosure. Only NVIDIA DGX-2 systems running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • NVIDIA DGX-2
Versions: All versions prior to the fixed firmware release
Operating Systems: DGX OS (Ubuntu-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privilege user access and ability to precondition the heap. Only affects DGX-2 systems, not other DGX models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level code execution, allowing attackers to install persistent malware, steal sensitive data, or disrupt all DGX-2 operations.

🟠

Likely Case

Privilege escalation from high-privilege user to root, leading to unauthorized access to protected resources and potential data exfiltration.

🟢

If Mitigated

Limited impact due to proper privilege separation and network segmentation, potentially resulting only in denial of service for the affected component.

🌐 Internet-Facing: LOW - Requires authenticated high-privilege access and local system access, making remote exploitation unlikely without additional vulnerabilities.
🏢 Internal Only: MEDIUM - Internal users with high privileges could exploit this to gain root access, but requires specific preconditions and heap manipulation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires high privileges, heap preconditioning, and detailed knowledge of the OFBD component. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: DGX-2 firmware update with CVE-2023-0200 fix

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5449

Restart Required: Yes

Instructions:

1. Download the latest DGX-2 firmware from NVIDIA's support portal. 2. Follow NVIDIA's DGX-2 firmware update procedures. 3. Reboot the system after applying the update. 4. Verify the update was successful using the version check command.

🔧 Temporary Workarounds

Restrict High-Privilege Access

linux

Limit the number of users with high privileges on DGX-2 systems to reduce attack surface.

sudo usermod -G sudo -l username (to remove from sudo group)
sudo visudo (to edit sudoers file and restrict privileges)

Implement Process Isolation

linux

Run OFBD-related processes in isolated containers or with reduced privileges where possible.

docker run --security-opt=no-new-privileges -d image_name
systemctl edit service_name (to add User= and Group= directives)

🧯 If You Can't Patch

  • Implement strict access controls and monitor all high-privilege user activities on DGX-2 systems
  • Segment DGX-2 systems from critical network resources and implement network-based intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check DGX-2 firmware version against NVIDIA's advisory. Systems running versions prior to the fixed release are vulnerable.

Check Version:

sudo dmidecode -s system-version | grep DGX-2 && sudo cat /etc/dgx-release

Verify Fix Applied:

Verify the firmware version matches or exceeds the patched version specified in NVIDIA's advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation by high-privilege users
  • OFBD component crashes or abnormal termination
  • Unexpected privilege escalation events

Network Indicators:

  • Unusual outbound connections from DGX-2 systems following privilege escalation

SIEM Query:

source="dgx-logs" AND (event_type="process_creation" AND user="high_privilege_user") OR (event_type="crash" AND component="OFBD")

🔗 References

📤 Share & Export