CVE-2024-0148
📋 TL;DR
This vulnerability in NVIDIA Jetson Linux and IGX OS allows attackers with physical access to load untrusted code via the UEFI firmware RCM boot mode. Successful exploitation could lead to code execution, privilege escalation, data tampering, denial of service, or information disclosure. This affects NVIDIA Jetson and IGX platform users who haven't applied the security update.
💻 Affected Systems
- NVIDIA Jetson Linux
- NVIDIA IGX OS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including persistent malware installation, data theft, device bricking, and lateral movement to other network components.
Likely Case
Local attacker gains administrative privileges, tampers with system data, or causes service disruption on the affected device.
If Mitigated
With proper physical security controls, the attack surface is significantly reduced, though the vulnerability remains present in the firmware.
🎯 Exploit Status
Exploitation requires physical access to the device and knowledge of the RCM boot mode process. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Security update referenced in NVIDIA advisory
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5617
Restart Required: No
Instructions:
1. Review NVIDIA advisory at provided URL. 2. Download the security update for your specific Jetson/IGX platform. 3. Apply the firmware update following NVIDIA's documentation. 4. Verify the update was successful.
🔧 Temporary Workarounds
Disable RCM Boot Mode
allDisable the vulnerable RCM boot mode if not required for operations
Consult NVIDIA documentation for platform-specific RCM disable commands
Physical Security Controls
allImplement strict physical access controls to prevent unauthorized device access
🧯 If You Can't Patch
- Implement strict physical security controls and monitoring for vulnerable devices
- Isolate vulnerable devices in secure areas with limited access and network segmentation
🔍 How to Verify
Check if Vulnerable:
Check if your Jetson/IGX device is running a version prior to the security update by reviewing firmware version
Check Version:
Platform-specific commands vary; consult NVIDIA documentation for your device model
Verify Fix Applied:
Verify firmware version matches or exceeds the patched version specified in NVIDIA advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected RCM boot mode activations
- Unauthorized firmware modification attempts
- Physical access logs showing unauthorized entry
Network Indicators:
- Unusual network traffic from previously quiet devices
- Unexpected outbound connections from Jetson/IGX devices
SIEM Query:
Search for physical access events followed by system firmware modification logs on Jetson/IGX devices