CVE-2024-0148

7.6 HIGH

📋 TL;DR

This vulnerability in NVIDIA Jetson Linux and IGX OS allows attackers with physical access to load untrusted code via the UEFI firmware RCM boot mode. Successful exploitation could lead to code execution, privilege escalation, data tampering, denial of service, or information disclosure. This affects NVIDIA Jetson and IGX platform users who haven't applied the security update.

💻 Affected Systems

Products:
  • NVIDIA Jetson Linux
  • NVIDIA IGX OS
Versions: All versions prior to the security update
Operating Systems: Linux-based systems on NVIDIA Jetson and IGX platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the UEFI firmware's RCM boot mode implementation, affecting devices in default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including persistent malware installation, data theft, device bricking, and lateral movement to other network components.

🟠

Likely Case

Local attacker gains administrative privileges, tampers with system data, or causes service disruption on the affected device.

🟢

If Mitigated

With proper physical security controls, the attack surface is significantly reduced, though the vulnerability remains present in the firmware.

🌐 Internet-Facing: LOW - This requires physical access to the device, not remote exploitation.
🏢 Internal Only: HIGH - Physical access to vulnerable devices within facilities could lead to significant compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to the device and knowledge of the RCM boot mode process. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update referenced in NVIDIA advisory

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5617

Restart Required: No

Instructions:

1. Review NVIDIA advisory at provided URL. 2. Download the security update for your specific Jetson/IGX platform. 3. Apply the firmware update following NVIDIA's documentation. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable RCM Boot Mode

all

Disable the vulnerable RCM boot mode if not required for operations

Consult NVIDIA documentation for platform-specific RCM disable commands

Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized device access

🧯 If You Can't Patch

  • Implement strict physical security controls and monitoring for vulnerable devices
  • Isolate vulnerable devices in secure areas with limited access and network segmentation

🔍 How to Verify

Check if Vulnerable:

Check if your Jetson/IGX device is running a version prior to the security update by reviewing firmware version

Check Version:

Platform-specific commands vary; consult NVIDIA documentation for your device model

Verify Fix Applied:

Verify firmware version matches or exceeds the patched version specified in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected RCM boot mode activations
  • Unauthorized firmware modification attempts
  • Physical access logs showing unauthorized entry

Network Indicators:

  • Unusual network traffic from previously quiet devices
  • Unexpected outbound connections from Jetson/IGX devices

SIEM Query:

Search for physical access events followed by system firmware modification logs on Jetson/IGX devices

🔗 References

📤 Share & Export