CVE-2024-0150

7.1 HIGH

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in NVIDIA GPU display drivers for Windows and Linux. Attackers could exploit this to cause denial of service, information disclosure, or potentially execute arbitrary code. All systems using affected NVIDIA GPU drivers are vulnerable.

💻 Affected Systems

Products:
  • NVIDIA GPU Display Driver
Versions: Multiple versions across Windows and Linux platforms (check NVIDIA advisory for specific versions)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected driver versions are vulnerable. Requires local system access or ability to execute code on target.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution leading to complete data loss, persistent backdoors, or ransomware deployment.

🟠

Likely Case

System crashes, blue screens, or application instability causing denial of service and potential data corruption.

🟢

If Mitigated

Limited impact with proper segmentation and privilege restrictions, potentially only affecting GPU driver functionality.

🌐 Internet-Facing: LOW - Requires local access or ability to run code on the system; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised internal accounts could exploit this to escalate privileges or disrupt systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to execute code. Buffer manipulation techniques needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific patched driver versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5614

Restart Required: Yes

Instructions:

1. Visit NVIDIA driver download page. 2. Download latest driver for your GPU and OS. 3. Run installer with administrative privileges. 4. Complete installation and restart system.

🔧 Temporary Workarounds

Restrict local code execution

all

Limit user privileges and application execution to reduce attack surface

🧯 If You Can't Patch

  • Segment affected systems from critical infrastructure
  • Implement strict access controls and monitor for suspicious GPU driver activity

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA driver version in device manager (Windows) or via 'nvidia-smi' command (Linux) and compare with affected versions in advisory

Check Version:

Windows: dxdiag or device manager; Linux: nvidia-smi --query-gpu=driver_version --format=csv

Verify Fix Applied:

Verify driver version matches or exceeds patched version listed in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • GPU driver crashes
  • System instability events
  • Unexpected driver reloads

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID 1000 or 1001 in Windows Event Logs with NVIDIA driver module names

🔗 References

📤 Share & Export