CVE-2023-31019

7.8 HIGH

📋 TL;DR

This vulnerability in NVIDIA GPU Display Driver for Windows allows attackers to impersonate clients through named pipe access issues in wksServicePlugin.dll. It affects Windows systems with vulnerable NVIDIA GPU drivers, potentially enabling privilege escalation or unauthorized access to secure contexts.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions prior to 537.13
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems with NVIDIA GPUs using the vulnerable driver component wksServicePlugin.dll.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through privilege escalation, allowing attackers to execute arbitrary code with SYSTEM privileges or access sensitive data.

🟠

Likely Case

Local privilege escalation enabling attackers to gain higher privileges than their current user context, potentially leading to lateral movement or persistence.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially only allowing information disclosure without code execution.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some technical knowledge of named pipe exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 537.13 and later

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5491

Restart Required: Yes

Instructions:

1. Download latest NVIDIA driver from official website. 2. Run installer with administrative privileges. 3. Select 'Custom installation' and check 'Perform clean installation'. 4. Complete installation and restart system.

🔧 Temporary Workarounds

Restrict named pipe access

windows

Configure Windows security policies to restrict access to vulnerable named pipes used by NVIDIA driver

Use Windows Security Policy Editor (secpol.msc) to configure named pipe permissions

Disable vulnerable service

windows

Temporarily disable NVIDIA Display Container LS service if not essential

sc config NVDisplay.ContainerLocalSystem start= disabled
sc stop NVDisplay.ContainerLocalSystem

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for named pipe activities
  • Isolate affected systems from critical network segments and apply principle of least privilege

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version in Device Manager > Display adapters > NVIDIA GPU > Driver tab, or run 'nvidia-smi' command if available.

Check Version:

wmic path win32_videocontroller get caption, driverversion

Verify Fix Applied:

Verify driver version is 537.13 or higher and check that wksServicePlugin.dll has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual named pipe creation/access events in Windows Security logs
  • Suspicious process creation from NVIDIA driver components

Network Indicators:

  • Local named pipe communication anomalies
  • Unexpected inter-process communication involving NVIDIA services

SIEM Query:

EventID=4688 AND ProcessName LIKE '%nvidia%' AND CommandLine CONTAINS 'pipe'

🔗 References

📤 Share & Export