CVE-2023-31019
📋 TL;DR
This vulnerability in NVIDIA GPU Display Driver for Windows allows attackers to impersonate clients through named pipe access issues in wksServicePlugin.dll. It affects Windows systems with vulnerable NVIDIA GPU drivers, potentially enabling privilege escalation or unauthorized access to secure contexts.
💻 Affected Systems
- NVIDIA GPU Display Driver
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through privilege escalation, allowing attackers to execute arbitrary code with SYSTEM privileges or access sensitive data.
Likely Case
Local privilege escalation enabling attackers to gain higher privileges than their current user context, potentially leading to lateral movement or persistence.
If Mitigated
Limited impact with proper access controls and monitoring, potentially only allowing information disclosure without code execution.
🎯 Exploit Status
Requires local access and some technical knowledge of named pipe exploitation techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 537.13 and later
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5491
Restart Required: Yes
Instructions:
1. Download latest NVIDIA driver from official website. 2. Run installer with administrative privileges. 3. Select 'Custom installation' and check 'Perform clean installation'. 4. Complete installation and restart system.
🔧 Temporary Workarounds
Restrict named pipe access
windowsConfigure Windows security policies to restrict access to vulnerable named pipes used by NVIDIA driver
Use Windows Security Policy Editor (secpol.msc) to configure named pipe permissions
Disable vulnerable service
windowsTemporarily disable NVIDIA Display Container LS service if not essential
sc config NVDisplay.ContainerLocalSystem start= disabled
sc stop NVDisplay.ContainerLocalSystem
🧯 If You Can't Patch
- Implement strict access controls and monitoring for named pipe activities
- Isolate affected systems from critical network segments and apply principle of least privilege
🔍 How to Verify
Check if Vulnerable:
Check NVIDIA driver version in Device Manager > Display adapters > NVIDIA GPU > Driver tab, or run 'nvidia-smi' command if available.
Check Version:
wmic path win32_videocontroller get caption, driverversion
Verify Fix Applied:
Verify driver version is 537.13 or higher and check that wksServicePlugin.dll has been updated.
📡 Detection & Monitoring
Log Indicators:
- Unusual named pipe creation/access events in Windows Security logs
- Suspicious process creation from NVIDIA driver components
Network Indicators:
- Local named pipe communication anomalies
- Unexpected inter-process communication involving NVIDIA services
SIEM Query:
EventID=4688 AND ProcessName LIKE '%nvidia%' AND CommandLine CONTAINS 'pipe'