CVE-2024-0145

6.8 MEDIUM

📋 TL;DR

This vulnerability in NVIDIA's nvJPEG2000 library allows attackers to execute arbitrary code or tamper with data by sending specially crafted JPEG2000 files. It affects systems using NVIDIA's GPU-accelerated JPEG2000 decoding capabilities, particularly in data centers, cloud services, and applications processing untrusted image files.

💻 Affected Systems

Products:
  • NVIDIA nvJPEG2000 library
Versions: All versions prior to the patched release
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using nvJPEG2000 for decoding untrusted JPEG2000 files. Common in medical imaging, geospatial, and media processing applications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Service disruption through crashes or denial of service, with potential for limited code execution in constrained environments.

🟢

If Mitigated

Contained impact through proper sandboxing, minimal privileges, and network segmentation limiting lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires delivering a malicious JPEG2000 file to a vulnerable system. No authentication needed if file upload/processing is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific version

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5596

Restart Required: Yes

Instructions:

1. Review NVIDIA advisory for affected products
2. Download and install updated nvJPEG2000 library
3. Restart affected services or systems
4. Test functionality with valid JPEG2000 files

🔧 Temporary Workarounds

Input Validation

all

Implement strict validation of JPEG2000 files before processing

Network Segmentation

all

Isolate systems using nvJPEG2000 from untrusted networks

🧯 If You Can't Patch

  • Implement strict file upload controls and validation
  • Run nvJPEG2000 in sandboxed/containerized environments with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check nvJPEG2000 library version against NVIDIA advisory

Check Version:

Check library version through application dependencies or system package manager

Verify Fix Applied:

Verify updated library version is installed and test with known malicious JPEG2000 files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing JPEG2000 files
  • Memory access violations in nvJPEG2000 processes

Network Indicators:

  • Unusual JPEG2000 file uploads to vulnerable endpoints

SIEM Query:

Process: nvJPEG2000 AND (EventID: 1000 OR ExceptionCode: 0xC0000005)

🔗 References

📤 Share & Export