CVE-2024-0117
📋 TL;DR
An out-of-bounds read vulnerability in NVIDIA GPU Display Driver for Windows allows unprivileged users to potentially execute arbitrary code, escalate privileges, or cause denial of service. This affects Windows systems with vulnerable NVIDIA GPU drivers. Regular users without administrative rights can exploit this vulnerability.
💻 Affected Systems
- NVIDIA GPU Display Driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with code execution leading to privilege escalation, data theft, and persistent backdoor installation.
Likely Case
Local privilege escalation allowing attackers to gain administrative privileges on the compromised system.
If Mitigated
Denial of service or application crashes if exploit attempts are blocked by security controls.
🎯 Exploit Status
Exploitation requires local user access but no administrative privileges. Technical details are available in the Talos report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check NVIDIA Security Bulletin for specific patched driver versions
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5586
Restart Required: Yes
Instructions:
1. Visit NVIDIA Driver Downloads page. 2. Download latest driver for your GPU. 3. Run installer with administrative privileges. 4. Restart system when prompted.
🔧 Temporary Workarounds
Restrict local user access
windowsLimit non-administrative user access to systems with vulnerable drivers
Application control policies
windowsImplement application whitelisting to prevent unauthorized code execution
🧯 If You Can't Patch
- Implement strict least privilege access controls
- Monitor for unusual process creation or privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check NVIDIA driver version in Device Manager > Display adapters > Properties > Driver tab
Check Version:
Open NVIDIA Control Panel > System Information or run 'nvidia-smi' in command line
Verify Fix Applied:
Verify driver version matches or exceeds patched version listed in NVIDIA advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected process creation with SYSTEM privileges
- Driver-related crashes in Windows Event Logs
Network Indicators:
- Unusual outbound connections following local privilege escalation
SIEM Query:
EventID=4688 AND NewProcessName contains 'cmd.exe' OR 'powershell.exe' AND SubjectUserName!=SYSTEM AND TokenElevationType=%%1938