CVE-2024-0136
📋 TL;DR
NVIDIA Container Toolkit has an improper isolation vulnerability where specially crafted container images could allow untrusted code to access host devices. This only affects systems with non-default configurations. Organizations using NVIDIA Container Toolkit with custom configurations are at risk.
💻 Affected Systems
- NVIDIA Container Toolkit
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full host compromise including code execution, privilege escalation, data theft, and denial of service through container escape to host system.
Likely Case
Container escape leading to information disclosure and potential data tampering on the host system.
If Mitigated
Limited impact with proper container isolation and default configurations maintained.
🎯 Exploit Status
Requires ability to deploy specially crafted container images and non-default configuration of NVIDIA Container Toolkit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check NVIDIA advisory for specific patched versions
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5599
Restart Required: No
Instructions:
1. Review NVIDIA advisory for patched versions. 2. Update NVIDIA Container Toolkit to latest version. 3. Verify configuration follows default settings.
🔧 Temporary Workarounds
Revert to Default Configuration
allEnsure NVIDIA Container Toolkit uses default configuration settings which are not vulnerable
Review and reset NVIDIA Container Toolkit configuration to default values
Restrict Container Deployment
allLimit who can deploy containers and what container images can be used
Implement container image signing and verification
Use container runtime policies
🧯 If You Can't Patch
- Ensure NVIDIA Container Toolkit uses only default configuration settings
- Implement strict container image verification and allowlisting policies
🔍 How to Verify
Check if Vulnerable:
Check NVIDIA Container Toolkit version and configuration. Review if custom configurations deviate from defaults.
Check Version:
nvidia-ctk version
Verify Fix Applied:
Verify NVIDIA Container Toolkit is updated to patched version and configuration matches default settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual container deployment activity
- Container escape attempts in system logs
- Unexpected device access from containers
Network Indicators:
- Containers accessing host network resources unexpectedly
SIEM Query:
Search for container runtime logs showing device access patterns or configuration changes to NVIDIA Container Toolkit