CVE-2024-0117

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in NVIDIA GPU Display Driver for Windows allows unprivileged users to potentially execute arbitrary code, escalate privileges, or cause denial of service. This affects Windows systems with vulnerable NVIDIA GPU drivers. Regular users without administrative rights can exploit this vulnerability.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions prior to the patched release (specific versions in vendor advisory)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems with NVIDIA GPUs. Requires local user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with code execution leading to privilege escalation, data theft, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on the compromised system.

🟢

If Mitigated

Denial of service or application crashes if exploit attempts are blocked by security controls.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring user access to the system.
🏢 Internal Only: HIGH - Any compromised user account can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local user access but no administrative privileges. Technical details are available in the Talos report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA Security Bulletin for specific patched driver versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5586

Restart Required: Yes

Instructions:

1. Visit NVIDIA Driver Downloads page. 2. Download latest driver for your GPU. 3. Run installer with administrative privileges. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit non-administrative user access to systems with vulnerable drivers

Application control policies

windows

Implement application whitelisting to prevent unauthorized code execution

🧯 If You Can't Patch

  • Implement strict least privilege access controls
  • Monitor for unusual process creation or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version in Device Manager > Display adapters > Properties > Driver tab

Check Version:

Open NVIDIA Control Panel > System Information or run 'nvidia-smi' in command line

Verify Fix Applied:

Verify driver version matches or exceeds patched version listed in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation with SYSTEM privileges
  • Driver-related crashes in Windows Event Logs

Network Indicators:

  • Unusual outbound connections following local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName contains 'cmd.exe' OR 'powershell.exe' AND SubjectUserName!=SYSTEM AND TokenElevationType=%%1938

🔗 References

📤 Share & Export