CVE-2024-0091

7.8 HIGH

📋 TL;DR

This vulnerability in NVIDIA GPU Display Drivers allows users to cause untrusted pointer dereference through driver API execution. Successful exploitation could lead to denial of service, information disclosure, or data tampering. Affects users of NVIDIA GPU drivers on Windows and Linux systems.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Specific versions not provided in CVE description, check NVIDIA advisory for exact ranges
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux versions of NVIDIA GPU drivers. Requires user access to execute driver APIs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including data theft, system instability, and potential privilege escalation leading to full control of affected systems.

🟠

Likely Case

Denial of service through system crashes or driver instability, potentially exposing sensitive memory contents.

🟢

If Mitigated

Limited impact with proper access controls and isolation, potentially only affecting the GPU driver functionality.

🌐 Internet-Facing: LOW - Requires local access to execute driver APIs, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes with driver access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute driver APIs. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific patched versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5551

Restart Required: Yes

Instructions:

1. Visit NVIDIA Driver Downloads page
2. Download latest driver for your GPU and OS
3. Run installer with administrative privileges
4. Restart system after installation completes

🔧 Temporary Workarounds

Restrict Driver API Access

all

Limit user access to NVIDIA driver APIs through access controls and privilege management

Application Whitelisting

all

Implement application control to prevent unauthorized programs from accessing GPU driver APIs

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute GPU driver APIs
  • Isolate systems with vulnerable drivers from sensitive networks and data

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version against advisory at https://nvidia.custhelp.com/app/answers/detail/a_id/5551

Check Version:

Windows: nvidia-smi | findstr "Driver Version" | Linux: nvidia-smi --query-gpu=driver_version --format=csv

Verify Fix Applied:

Verify driver version is updated to patched version listed in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected GPU driver crashes
  • Access violations in NVIDIA driver logs
  • System instability events related to display driver

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Search for Event ID 1000 or 1001 in Windows Event Logs with NVIDIA driver module names, or kernel panic/crash logs on Linux systems

🔗 References

📤 Share & Export