CVE-2024-0135

7.6 HIGH

📋 TL;DR

NVIDIA Container Toolkit has an improper isolation vulnerability where malicious container images can modify host binaries. This affects systems using NVIDIA Container Toolkit to run GPU-accelerated containers. Attackers could exploit this to compromise the host system from within a container.

💻 Affected Systems

Products:
  • NVIDIA Container Toolkit
Versions: All versions prior to the fix
Operating Systems: Linux systems with NVIDIA GPU support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using NVIDIA Container Toolkit for GPU-accelerated container workloads.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full host compromise with code execution, privilege escalation, data theft, and denial of service through host binary modification.

🟠

Likely Case

Privilege escalation and data tampering within affected container environments, potentially leading to lateral movement.

🟢

If Mitigated

Limited impact with proper container security controls, network segmentation, and least privilege principles.

🌐 Internet-Facing: MEDIUM - Requires container execution capability, but internet-facing container registries could deliver malicious images.
🏢 Internal Only: HIGH - Internal attackers or compromised containers can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to run or create container images, but no authentication needed once container execution is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version from NVIDIA's repositories

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5599

Restart Required: No

Instructions:

1. Update NVIDIA Container Toolkit using your package manager. 2. For Ubuntu/Debian: sudo apt update && sudo apt install nvidia-container-toolkit. 3. For RHEL/CentOS: sudo yum update nvidia-container-toolkit. 4. Verify installation with nvidia-ctk --version.

🔧 Temporary Workarounds

Disable NVIDIA Container Toolkit

all

Temporarily disable GPU acceleration for containers until patching is possible

sudo systemctl stop nvidia-container-toolkit
sudo systemctl disable nvidia-container-toolkit

Restrict container image sources

all

Only allow trusted container registries and enforce image signing

🧯 If You Can't Patch

  • Implement strict container image policies allowing only signed images from trusted sources
  • Apply network segmentation to isolate container environments and limit lateral movement potential

🔍 How to Verify

Check if Vulnerable:

Check if NVIDIA Container Toolkit is installed and compare version against patched release

Check Version:

nvidia-ctk --version

Verify Fix Applied:

Verify nvidia-container-toolkit package version matches latest from NVIDIA repositories

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to host binaries from container processes
  • Container escape attempts in system logs

Network Indicators:

  • Suspicious container image pulls from untrusted sources
  • Unexpected outbound connections from container hosts

SIEM Query:

source="docker" OR source="containerd" AND (event="binary_modification" OR event="privilege_escalation")

🔗 References

📤 Share & Export