CVE-2024-0136

7.6 HIGH

📋 TL;DR

NVIDIA Container Toolkit has an improper isolation vulnerability where specially crafted container images could allow untrusted code to access host devices. This only affects systems with non-default configurations. Organizations using NVIDIA Container Toolkit with custom configurations are at risk.

💻 Affected Systems

Products:
  • NVIDIA Container Toolkit
Versions: All versions prior to the fix
Operating Systems: Linux systems with NVIDIA Container Toolkit
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured in non-default ways. Default configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full host compromise including code execution, privilege escalation, data theft, and denial of service through container escape to host system.

🟠

Likely Case

Container escape leading to information disclosure and potential data tampering on the host system.

🟢

If Mitigated

Limited impact with proper container isolation and default configurations maintained.

🌐 Internet-Facing: MEDIUM - Requires container deployment capability but could be exploited through malicious container images.
🏢 Internal Only: HIGH - Internal users with container deployment privileges could exploit this for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to deploy specially crafted container images and non-default configuration of NVIDIA Container Toolkit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific patched versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5599

Restart Required: No

Instructions:

1. Review NVIDIA advisory for patched versions. 2. Update NVIDIA Container Toolkit to latest version. 3. Verify configuration follows default settings.

🔧 Temporary Workarounds

Revert to Default Configuration

all

Ensure NVIDIA Container Toolkit uses default configuration settings which are not vulnerable

Review and reset NVIDIA Container Toolkit configuration to default values

Restrict Container Deployment

all

Limit who can deploy containers and what container images can be used

Implement container image signing and verification
Use container runtime policies

🧯 If You Can't Patch

  • Ensure NVIDIA Container Toolkit uses only default configuration settings
  • Implement strict container image verification and allowlisting policies

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA Container Toolkit version and configuration. Review if custom configurations deviate from defaults.

Check Version:

nvidia-ctk version

Verify Fix Applied:

Verify NVIDIA Container Toolkit is updated to patched version and configuration matches default settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual container deployment activity
  • Container escape attempts in system logs
  • Unexpected device access from containers

Network Indicators:

  • Containers accessing host network resources unexpectedly

SIEM Query:

Search for container runtime logs showing device access patterns or configuration changes to NVIDIA Container Toolkit

🔗 References

📤 Share & Export