CVE-2024-0112

7.5 HIGH

📋 TL;DR

This vulnerability in NVIDIA Jetson AGX Orin and IGX Orin software allows attackers to escalate permissions through improper input validation. Successful exploitation could lead to code execution, denial of service, data corruption, information disclosure, or privilege escalation. Organizations using these NVIDIA embedded systems are affected.

💻 Affected Systems

Products:
  • NVIDIA Jetson AGX Orin
  • NVIDIA IGX Orin
Versions: Specific affected versions not detailed in advisory; check NVIDIA documentation for exact ranges
Operating Systems: NVIDIA JetPack SDK and related embedded Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the software stack running on these embedded systems; physical access or network access to the device may be required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root-level code execution leading to complete control of the device, data theft, and persistent backdoor installation.

🟠

Likely Case

Limited privilege escalation allowing unauthorized access to restricted functions or data, potentially leading to service disruption or data corruption.

🟢

If Mitigated

Minimal impact with proper network segmentation, least privilege access controls, and regular security monitoring in place.

🌐 Internet-Facing: MEDIUM - While these are typically embedded systems, internet-facing deployments could be targeted if exposed.
🏢 Internal Only: HIGH - These systems often control critical functions in industrial, automotive, or edge computing environments where compromise could have significant operational impact.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of initial access or privilege; the advisory suggests limited permission escalation rather than full unauthenticated compromise.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific fixed versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5611

Restart Required: No

Instructions:

1. Review NVIDIA advisory ID 5611 for specific patch details. 2. Download and apply the latest security updates from NVIDIA. 3. Update JetPack SDK and firmware to recommended versions. 4. Verify updates through version checks.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit communication to necessary services only.

Least Privilege Configuration

all

Configure systems with minimal necessary permissions and disable unnecessary services.

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules to limit exposure
  • Enable comprehensive logging and monitoring for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check current JetPack SDK version and compare against NVIDIA's patched version list in advisory 5611.

Check Version:

dpkg -l | grep -i jetpack  # For Debian-based systems, or check NVIDIA system management tools

Verify Fix Applied:

Verify system is running patched versions as specified in NVIDIA's security bulletin.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized process execution with elevated permissions
  • System service anomalies

Network Indicators:

  • Unusual outbound connections from embedded devices
  • Anomalous authentication attempts to device services

SIEM Query:

source="jetson-logs" AND (event_type="privilege_escalation" OR process_name="unexpected_service")

🔗 References

📤 Share & Export