CVE-2024-0074

7.1 HIGH

📋 TL;DR

This vulnerability in NVIDIA GPU Display Driver for Linux allows attackers to read memory beyond allocated buffer boundaries. Successful exploitation could lead to denial of service or data tampering. Affects Linux systems with vulnerable NVIDIA GPU drivers.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver for Linux
Versions: Specific versions not detailed in provided references; check NVIDIA advisory for exact affected versions
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Linux systems with NVIDIA GPU drivers. Exact version ranges should be verified via NVIDIA advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to denial of service, potential data corruption or tampering, and possible information disclosure from adjacent memory.

🟠

Likely Case

Application crashes or instability affecting GPU-dependent services, potentially disrupting workloads on affected systems.

🟢

If Mitigated

Limited impact with proper access controls and isolation, though still vulnerable to local attackers with GPU access.

🌐 Internet-Facing: LOW - Requires local access to the system with GPU driver privileges.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to disrupt GPU-dependent services or applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with GPU driver. No public exploit code identified in provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific patched driver versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5520

Restart Required: Yes

Instructions:

1. Visit NVIDIA driver download page. 2. Download latest secure driver version. 3. Install using appropriate package manager or installer. 4. Reboot system to load new driver.

🔧 Temporary Workarounds

Restrict GPU Access

linux

Limit which users can access GPU devices to reduce attack surface

chmod 660 /dev/nvidia*
chown root:video /dev/nvidia*

Disable Unused GPU Features

linux

Disable GPU features not required for workload to reduce attack vectors

nvidia-smi -i 0 -pm 0
nvidia-smi -i 0 -acp 0

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can interact with GPU devices
  • Isolate GPU workloads to dedicated systems with minimal user access

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version against advisory: nvidia-smi --query-gpu=driver_version --format=csv,noheader

Check Version:

nvidia-smi --query-gpu=driver_version --format=csv,noheader

Verify Fix Applied:

Verify driver version matches or exceeds patched version from NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing GPU driver crashes
  • Application logs indicating GPU access failures
  • System logs showing unexpected GPU resets

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "NVIDIA" AND ("crash" OR "panic" OR "segfault")

🔗 References

📤 Share & Export