CVE-2024-0107

7.8 HIGH

📋 TL;DR

This vulnerability in NVIDIA GPU Display Driver for Windows allows an unprivileged user to trigger an out-of-bounds read in the user mode layer. Successful exploitation could lead to code execution, denial of service, privilege escalation, information disclosure, or data tampering. Affects Windows systems with vulnerable NVIDIA GPU drivers.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions prior to 551.61
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both consumer and professional GPU lines when running vulnerable driver versions on Windows.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM, enabling remote code execution, data theft, and persistent backdoor installation.

🟠

Likely Case

Local denial of service (system crash/BSOD) or information disclosure from GPU memory, potentially exposing sensitive data.

🟢

If Mitigated

Limited impact if proper user privilege separation exists and vulnerable drivers aren't installed on critical systems.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user (including low-privilege accounts) can potentially exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local user access but no special privileges. Exploit development would require understanding of GPU driver internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 551.61 or later

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5557

Restart Required: Yes

Instructions:

1. Download latest NVIDIA driver from official website. 2. Run installer with administrative privileges. 3. Select 'Custom installation' and check 'Perform clean installation'. 4. Complete installation and restart system.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit physical and remote access to systems with vulnerable drivers to trusted users only.

Use standard user accounts

windows

Ensure all users operate with standard (non-administrative) privileges to limit potential impact.

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and sensitive data
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Open NVIDIA Control Panel → System Information → Driver Version. Check if version is below 551.61.

Check Version:

nvidia-smi (if installed) or check Display adapters in Device Manager

Verify Fix Applied:

Confirm driver version is 551.61 or higher in NVIDIA Control Panel after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes/BSODs
  • GPU driver error events in Windows Event Log
  • Unusual process creation from GPU-related services

Network Indicators:

  • Not network exploitable - focus on local system monitoring

SIEM Query:

EventID=1000 OR EventID=1001 with faulting module containing nv* OR Source='nvlddmkm'

🔗 References

📤 Share & Export