CVE-2024-0121

7.8 HIGH

📋 TL;DR

This vulnerability in NVIDIA GPU Display Driver for Windows allows an unprivileged user to trigger an out-of-bounds read in the user mode layer. Successful exploitation could lead to code execution, privilege escalation, denial of service, or information disclosure. All Windows systems with vulnerable NVIDIA GPU drivers are affected.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions prior to the patched release (specific versions in vendor advisory)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both consumer and professional NVIDIA GPU drivers on Windows systems. Requires local user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM, enabling remote code execution, data theft, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on the compromised system.

🟢

If Mitigated

Limited to denial of service or information disclosure if proper isolation and least privilege are enforced.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring user access to the system.
🏢 Internal Only: HIGH - Malicious insiders or compromised user accounts can exploit this to escalate privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local user access and knowledge of driver internals. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA Security Bulletin for specific patched driver versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5586

Restart Required: Yes

Instructions:

1. Visit NVIDIA Driver Downloads page. 2. Download latest driver for your GPU. 3. Run installer with administrative privileges. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts to trusted personnel only

Implement application whitelisting

windows

Prevent unauthorized applications from executing

🧯 If You Can't Patch

  • Implement strict least privilege - ensure users only have necessary permissions
  • Monitor for suspicious driver-related activity and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA Control Panel → System Information → Driver Version and compare with patched versions in advisory

Check Version:

nvidia-smi (if installed) or check NVIDIA Control Panel

Verify Fix Applied:

Verify driver version matches or exceeds patched version listed in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual driver access attempts
  • Privilege escalation events
  • Crash dumps from nvlddmkm.sys

Network Indicators:

  • None - local vulnerability only

SIEM Query:

EventID 4688 with process name containing NVIDIA or driver-related executables followed by privilege escalation events

🔗 References

📤 Share & Export