CVE-2024-0114

8.1 HIGH

📋 TL;DR

This vulnerability in NVIDIA Hopper HGX 8-GPU systems allows attackers with administrative access to the Baseboard Management Controller (BMC) to gain administrator access to the HGX Management Controller (HMC). This affects organizations using NVIDIA Hopper HGX 8-GPU systems where BMC administrative access could be compromised. The vulnerability enables full control over the HMC management interface.

💻 Affected Systems

Products:
  • NVIDIA Hopper HGX for 8-GPU systems
Versions: All versions prior to patched firmware
Operating Systems: Any OS using affected NVIDIA HGX hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative access to the BMC as a prerequisite. The vulnerability exists in the HMC firmware component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the HGX Management Controller leading to code execution on HMC, denial of service for all managed GPUs, privilege escalation to HMC administrator, disclosure of sensitive management data, and tampering with GPU configurations and workloads.

🟠

Likely Case

Unauthorized administrative access to HMC allowing configuration changes, monitoring data access, and potential disruption of GPU operations in environments where BMC credentials are compromised.

🟢

If Mitigated

Limited impact if BMC access is properly secured with strong authentication, network segmentation, and least privilege principles preventing unauthorized administrative access.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative access to the BMC first, then leveraging the vulnerability to access HMC. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to NVIDIA advisory for specific firmware versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5561

Restart Required: Yes

Instructions:

1. Review NVIDIA advisory ID 5561. 2. Download updated HMC firmware from NVIDIA. 3. Apply firmware update through HMC management interface. 4. Reboot HMC to complete installation. 5. Verify firmware version after update.

🔧 Temporary Workarounds

Restrict BMC Administrative Access

all

Limit administrative access to BMC to only authorized personnel using strong authentication and network controls

Network Segmentation

all

Isolate BMC and HMC management interfaces on separate VLANs with strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls for BMC administrative interfaces with multi-factor authentication
  • Monitor BMC and HMC logs for unauthorized access attempts and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check HMC firmware version against NVIDIA advisory. Vulnerable if running unpatched firmware.

Check Version:

Check HMC web interface or CLI for firmware version (specific command varies by HMC version)

Verify Fix Applied:

Verify HMC firmware version matches patched version specified in NVIDIA advisory after update.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized BMC login attempts followed by HMC administrative access
  • HMC configuration changes from unexpected sources
  • Failed authentication attempts on HMC from BMC IPs

Network Indicators:

  • Unusual traffic between BMC and HMC interfaces
  • Administrative connections to HMC from BMC subnet

SIEM Query:

source_ip IN (BMC_IPs) AND destination_port IN (HMC_PORTS) AND action='admin_login'

🔗 References

📤 Share & Export