CVE-2024-0119

7.8 HIGH

📋 TL;DR

An unprivileged user can exploit an out-of-bounds read vulnerability in NVIDIA GPU Display Driver for Windows to potentially execute arbitrary code, escalate privileges, or cause denial of service. This affects Windows systems with vulnerable NVIDIA GPU drivers. Attackers could gain system-level access from a standard user account.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems with NVIDIA GPUs. Specific vulnerable versions detailed in NVIDIA advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, installing malware, stealing sensitive data, and persisting on the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls and install additional payloads from a compromised user session.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Any compromised user account on affected systems could lead to full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and user-level privileges. Exploit development may be complex but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest NVIDIA GPU Display Driver version (check NVIDIA advisory for specific version)

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5586

Restart Required: Yes

Instructions:

1. Download latest NVIDIA GPU driver from NVIDIA website. 2. Run installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts on affected systems to reduce attack surface

Enable Windows Defender Application Control

windows

Implement application whitelisting to prevent unauthorized code execution

🧯 If You Can't Patch

  • Implement strict least privilege principles for all user accounts
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version in Device Manager > Display adapters > NVIDIA GPU > Driver tab

Check Version:

Open command prompt and run: nvidia-smi (if installed) or check via Device Manager

Verify Fix Applied:

Verify driver version matches or exceeds patched version listed in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from NVIDIA display driver components
  • Failed privilege escalation attempts
  • Suspicious driver-related activity

Network Indicators:

  • Unusual outbound connections following local exploitation

SIEM Query:

Process creation where parent process contains 'nvidia' and child process is suspicious (e.g., cmd.exe, powershell.exe, wmic.exe)

🔗 References

📤 Share & Export