CVE-2024-0142

6.8 MEDIUM

📋 TL;DR

This vulnerability in NVIDIA's nvJPEG2000 library allows attackers to execute arbitrary code or tamper with data by exploiting an out-of-bounds write flaw via specially crafted JPEG2000 files. Systems using NVIDIA GPUs with the vulnerable library for image processing are affected, particularly in AI/ML, visualization, and media processing applications.

💻 Affected Systems

Products:
  • NVIDIA nvJPEG2000 library
Versions: All versions prior to the patched release
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using NVIDIA GPUs with CUDA support where nvJPEG2000 library is utilized for JPEG2000 image decoding.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Application crash leading to denial of service, with potential for limited code execution in the context of the vulnerable process.

🟢

If Mitigated

Application crash without code execution if memory protections like ASLR are effective, but service disruption still occurs.

🌐 Internet-Facing: MEDIUM - Risk exists if applications process untrusted JPEG2000 files from external sources, but requires specific file processing workflows.
🏢 Internal Only: LOW - Risk is limited to systems processing JPEG2000 files, which is a specialized format not commonly used in general workflows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious JPEG2000 file and getting it processed by vulnerable software. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA security bulletin for specific fixed versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5596

Restart Required: Yes

Instructions:

1. Review NVIDIA security bulletin for affected products. 2. Update NVIDIA GPU drivers and libraries to patched versions. 3. Restart affected systems and applications. 4. Verify update through version checks.

🔧 Temporary Workarounds

Disable JPEG2000 processing

all

Configure applications to avoid using nvJPEG2000 library for JPEG2000 file processing

Input validation

all

Implement strict validation of JPEG2000 files before processing

🧯 If You Can't Patch

  • Isolate systems using nvJPEG2000 library from untrusted networks
  • Implement application allowlisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver and library versions against security bulletin. Systems using nvJPEG2000 library with unpatched versions are vulnerable.

Check Version:

nvidia-smi (for driver) or check CUDA/nvJPEG2000 library versions via package manager

Verify Fix Applied:

Confirm NVIDIA driver and library versions match or exceed patched versions listed in security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing JPEG2000 files
  • Memory access violation errors in application logs
  • Unexpected process termination

Network Indicators:

  • Unusual outbound connections from image processing applications
  • Anomalous file uploads to systems using nvJPEG2000

SIEM Query:

Process termination events from applications using NVIDIA GPU libraries combined with file processing activities

🔗 References

📤 Share & Export