CVE-2024-0087

9.0 CRITICAL

📋 TL;DR

This vulnerability in NVIDIA Triton Inference Server allows attackers to set the logging location to arbitrary files, enabling log injection attacks. If exploited, it could lead to code execution, privilege escalation, or data tampering. Organizations using NVIDIA Triton Inference Server on Linux are affected.

💻 Affected Systems

Products:
  • NVIDIA Triton Inference Server
Versions: All versions prior to 24.04
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux deployments. The vulnerability exists in the logging configuration mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with root privileges leading to complete system compromise, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Denial of service through log file manipulation or privilege escalation to gain unauthorized access to sensitive inference data.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation preventing external access to the Triton server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user access to configure logging settings. The CVSS 9.0 score indicates high severity but exploitation requires some access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.04 or later

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5535

Restart Required: Yes

Instructions:

1. Download NVIDIA Triton Inference Server version 24.04 or later from NVIDIA's official repository. 2. Stop the Triton service. 3. Install the updated version. 4. Restart the Triton service. 5. Verify the version is 24.04 or higher.

🔧 Temporary Workarounds

Restrict Logging Directory Permissions

linux

Set strict file permissions on logging directories to prevent unauthorized file writes

chmod 750 /var/log/triton
chown root:triton /var/log/triton

Disable External Log Configuration

linux

Remove or restrict access to logging configuration endpoints if not required

# Configure Triton to use fixed log location only
# Review and disable unnecessary API endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Triton servers from untrusted networks
  • Apply principle of least privilege to Triton service accounts and file system permissions

🔍 How to Verify

Check if Vulnerable:

Check Triton server version: if version is below 24.04, the system is vulnerable

Check Version:

tritonserver --version

Verify Fix Applied:

Verify Triton server version is 24.04 or higher and test logging configuration restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized attempts to modify logging configuration
  • Log entries written to unexpected file locations
  • Suspicious file write operations in Triton log directories

Network Indicators:

  • Unusual API calls to logging configuration endpoints
  • Abnormal network traffic patterns to Triton management interfaces

SIEM Query:

source="triton" AND (event="config_change" OR event="log_location_change")

🔗 References

📤 Share & Export