CVE-2024-0143

6.8 MEDIUM

📋 TL;DR

This vulnerability in NVIDIA's nvJPEG2000 library allows attackers to execute arbitrary code or tamper with data by providing a specially crafted JPEG2000 file. It affects systems using NVIDIA's GPU-accelerated JPEG2000 decoding capabilities, potentially impacting applications in medical imaging, geospatial analysis, and media processing.

💻 Affected Systems

Products:
  • NVIDIA nvJPEG2000 library
Versions: All versions prior to 12.4
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using nvJPEG2000 for JPEG2000 decoding, including NVIDIA's own SDKs and third-party applications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to data theft, ransomware deployment, or complete system control.

🟠

Likely Case

Application crash leading to denial of service, with potential for limited code execution in the context of the vulnerable application.

🟢

If Mitigated

Application crash without code execution if memory protections are enabled, but service disruption still occurs.

🌐 Internet-Facing: MEDIUM - Requires attacker to upload or process malicious JPEG2000 files through vulnerable applications.
🏢 Internal Only: MEDIUM - Internal users could exploit through file upload features or processing workflows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious JPEG2000 file and getting it processed by vulnerable software. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: nvJPEG2000 12.4 or later

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5596

Restart Required: Yes

Instructions:

1. Download nvJPEG2000 12.4 or later from NVIDIA's developer website. 2. Replace existing nvJPEG2000 library files. 3. Restart any applications using the library. 4. Recompile applications if statically linked.

🔧 Temporary Workarounds

Disable JPEG2000 processing

all

Temporarily disable JPEG2000 file processing in applications until patched.

Application-specific configuration changes required

Input validation

all

Implement strict file validation for JPEG2000 files before processing.

Implement file signature verification and size limits

🧯 If You Can't Patch

  • Network segmentation to isolate systems using nvJPEG2000
  • Implement application allowlisting to prevent unauthorized JPEG2000 processing

🔍 How to Verify

Check if Vulnerable:

Check nvJPEG2000 library version using 'strings libnvjpeg2000.so | grep Version' on Linux or check DLL properties on Windows.

Check Version:

strings /usr/lib/libnvjpeg2000.so | grep -i version

Verify Fix Applied:

Verify installed version is 12.4 or higher using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing JPEG2000 files
  • Memory access violation errors in application logs

Network Indicators:

  • Unusual JPEG2000 file uploads to web applications
  • Multiple failed JPEG2000 processing attempts

SIEM Query:

source="application.log" AND ("segmentation fault" OR "access violation") AND "jpeg2000" OR "jp2"

🔗 References

📤 Share & Export