## Potential Security Impact
Escalation of Privilege, Code Execution, Denial of Service, Information Disclosure.
**Source:** HP, HP Product Security Response Team (PSRT)
**Reported By:** NVIDIA
## VULNERABILITY SUMMARY
NVIDIA has informed HP of potential security vulnerabilities in the NVIDIA GPU Display Driver which might allow escalation of privileges, code execution, denial of service, and/or information disclosure.
For detailed information on the vulnerabilities, visit the [NVIDIA Product Security__](<https://www.nvidia.com/en-us/security/> "External site." ) (in English) page.
## RESOLUTION
NVIDIA has released updates to mitigate the potential vulnerabilities. HP has identified affected platforms and the corresponding SoftPaqs with minimum versions that mitigate the potential vulnerability. See the affected platforms listed below.
Newer versions might become available and the minimum versions listed below might become obsolete. If a SoftPaq Link becomes invalid, check the HP Customer Support - Software and Driver Downloads site to obtain the latest update for your product model.
HP recommends keeping your system up to date with the latest firmware and software.
{"id": "HP:C06925019", "vendorId": null, "type": "hp", "bulletinFamily": "software", "title": "HPSBHF03690 rev. 3 - NVIDIA GPU Display Driver September 2020 Security Updates", "description": "## Potential Security Impact\nEscalation of Privilege, Code Execution, Denial of Service, Information Disclosure.\n\n**Source:** HP, HP Product Security Response Team (PSRT) \n\n**Reported By:** NVIDIA \n\n## VULNERABILITY SUMMARY\nNVIDIA has informed HP of potential security vulnerabilities in the NVIDIA GPU Display Driver which might allow escalation of privileges, code execution, denial of service, and/or information disclosure.\n\nFor detailed information on the vulnerabilities, visit the [NVIDIA Product Security__](<https://www.nvidia.com/en-us/security/> \"External site.\" ) (in English) page. \n\n## RESOLUTION\nNVIDIA has released updates to mitigate the potential vulnerabilities. HP has identified affected platforms and the corresponding SoftPaqs with minimum versions that mitigate the potential vulnerability. See the affected platforms listed below.\n\nNewer versions might become available and the minimum versions listed below might become obsolete. If a SoftPaq Link becomes invalid, check the HP Customer Support - Software and Driver Downloads site to obtain the latest update for your product model. \n\nHP recommends keeping your system up to date with the latest firmware and software.\n", "published": "2020-09-30T00:00:00", "modified": "2020-12-05T00:00:00", "cvss": {"score": "7.8", "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/"}, "cvss2": {}, "cvss3": {}, "href": "https://support.hp.com/us-en/document/c06925019", "reporter": "HP Product Security Response Team", "references": [], "cvelist": ["CVE-2020-5979", "CVE-2020-5980", "CVE-2020-5981", "CVE-2020-5982"], "immutableFields": [], "lastseen": "2021-12-30T16:03:41", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2020-5979", "CVE-2020-5980", "CVE-2020-5981", "CVE-2020-5982"]}, {"type": "lenovo", "idList": ["LENOVO:PS500358-NOSID", "LENOVO:PS500358-NVIDIA-GPU-DISPLAY-DRIVER-SEPTEMBER-2020-SECURITY-BULLETIN-NOSID"]}, {"type": "nvidia", "idList": ["NVIDIA:5075"]}, {"type": "pentestpartners", "idList": ["PENTESTPARTNERS:E69F942FAA1C98EC0E9BECFB29F6D937"]}]}, "score": {"value": 1.6, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2020-5979", "CVE-2020-5980", "CVE-2020-5981", "CVE-2020-5982"]}, {"type": "lenovo", "idList": ["LENOVO:PS500358-NOSID"]}, {"type": "pentestpartners", "idList": ["PENTESTPARTNERS:E69F942FAA1C98EC0E9BECFB29F6D937"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2020-5979", "epss": "0.000440000", "percentile": "0.102060000", "modified": "2023-03-20"}, {"cve": "CVE-2020-5980", "epss": "0.000440000", "percentile": "0.102060000", "modified": "2023-03-20"}, {"cve": "CVE-2020-5981", "epss": "0.000440000", "percentile": "0.102060000", "modified": "2023-03-20"}, {"cve": "CVE-2020-5982", "epss": "0.000440000", "percentile": "0.102060000", "modified": "2023-03-20"}], "vulnersScore": 1.6}, "affectedPackage": [], "_state": {"dependencies": 1659886665, "score": 1659886892, "epss": 1679323282}, "_internal": {"score_hash": "b3585d5b28060071007bec5035311eff"}}
{"lenovo": [{"lastseen": "2020-10-14T09:01:59", "description": "**Lenovo Security Advisory: **LEN-47663\n\n**Potential Impact: **Denial of service, code execution, privilege escalation, information disclosure\n\n**Severity: **High\n\n**Scope of Impact: **Industry-wide\n\n**CVE Identifier: ** CVE-2020-5979 , CVE-2020-5980, CVE-2020-5981, CVE-2020-5981 , CVE-2020-5982, CVE-2020-5983, CVE-2020-5984, CVE-2020-5985, CVE-2020-5986, CVE-2020-5987, CVE-2020-5988, CVE-2020-5989\n\n**Summary Description:**\n\nNVIDIA has released a software security update for the NVIDIA GPU Display Driver and NVIDIA vGPU Software. This update addresses issues that may lead to denial of service, code execution, escalation of privileges, or information disclosure.\n\n**Mitigation Strategy for Customers (what you should do to protect yourself):**\n\nNVIDIA recommends upgrading to the driver version (or newer) indicated for your model in the Product Impact section below\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-10-06T23:17:43", "type": "lenovo", "title": "NVIDIA GPU Display Driver - September 2020 Security Bulletin - Lenovo Support US", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5988", "CVE-2020-5986", "CVE-2020-5989", "CVE-2020-5980", "CVE-2020-5979", "CVE-2020-5987", "CVE-2020-5985", "CVE-2020-5981", "CVE-2020-5983", "CVE-2020-5982", "CVE-2020-5984"], "modified": "2020-10-13T16:29:54", "id": "LENOVO:PS500358-NOSID", "href": "https://support.lenovo.com/us/en/product_security/ps500358", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-11T16:37:23", "description": "**Lenovo Security Advisory: **LEN-47663\n\n**Potential Impact: **Denial of service, code execution, privilege escalation, information disclosure\n\n**Severity: **High\n\n**Scope of Impact: **Industry-wide\n\n**CVE Identifier: ** CVE-2020-5979 , CVE-2020-5980, CVE-2020-5981, CVE-2020-5981 , CVE-2020-5982, CVE-2020-5983, CVE-2020-5984, CVE-2020-5985, CVE-2020-5986, CVE-2020-5987, CVE-2020-5988, CVE-2020-5989\n\n**Summary Description:**\n\nNVIDIA has released a software security update for the NVIDIA GPU Display Driver and NVIDIA vGPU Software. This update addresses issues that may lead to denial of service, code execution, escalation of privileges, or information disclosure.\n\n**Mitigation Strategy for Customers (what you should do to protect yourself):**\n\nNVIDIA recommends upgrading to the driver version (or newer) indicated for your model in the Product Impact section below\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-10-06T23:17:43", "type": "lenovo", "title": "NVIDIA GPU Display Driver - September 2020 Security Bulletin - Lenovo Support NL", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5988", "CVE-2020-5986", "CVE-2020-5989", "CVE-2020-5979", "CVE-2020-5987", "CVE-2020-5985", "CVE-2020-5981", "CVE-2020-5983", "CVE-2020-5982", "CVE-2020-5984"], "modified": "2021-08-09T18:46:38", "id": "LENOVO:PS500358-NVIDIA-GPU-DISPLAY-DRIVER-SEPTEMBER-2020-SECURITY-BULLETIN-NOSID", "href": "https://support.lenovo.com/nl/nl/product_security/ps500358-nvidia-gpu-display-driver-september-2020-security-bulletin", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "nvidia": [{"lastseen": "2022-08-05T18:06:23", "description": "NVIDIA has released a software security update for NVIDIA\u00ae GPU Display Driver. This update addresses issues that may lead to denial of service, code execution, escalation of privileges, or information disclosure. To protect your system, download and install this software update from the [NVIDIA Driver Downloads page](<https://www.nvidia.com/Download/index.aspx>) or, for the vGPU software update, through the NVIDIA Licensing Portal. Go to [NVIDIA Product Security.](<https://www.nvidia.com/security/>)\n\n### Details\n\nThis section provides a summary of potential vulnerabilities and their impact that this security update addresses. Descriptions use [CWE\u2122](<https://cwe.mitre.org/>), and base scores and vectors use [CVSS](<https://www.first.org/cvss/user-guide>) v3.0 standards.\n\n#### NVIDIA GPU Display Driver\n\n**CVE IDs** | **Description** | **Base Score** | **Vector** \n---|---|---|--- \nCVE\u20112020\u20115979 | NVIDIA Display Driver contains a vulnerability in the Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges. | 7.8 | [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H>) \n \nCVE\u20112020\u20115980\n\n| NVIDIA Windows GPU Display Driver contains a vulnerability in multiple components in which a securely loaded system DLL will load its dependencies in an insecure fashion, which may lead to code execution or denial of service. | 7.8 | [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H>) \nCVE\u20112020\u20115981 | NVIDIA Windows GPU Display Driver contains a vulnerability in the DirectX11 user mode driver (`nvwgf2um/x.dll`), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution. | 7.8 | [AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H>) \nCVE\u20112020\u20115982 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (`nvlddmkm.sys`) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service. | 4.4 | [AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H>) \n \n#### NVIDIA vGPU Software\n\n**CVE IDs** | **Description** | **Base Score** | **Vector** \n---|---|---|--- \nCVE\u20112020\u20115983 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin and the host driver kernel module, in which the potential exists to write to a memory location that is outside the intended boundary of the frame buffer memory allocated to guest operating systems, which may lead to denial of service or information disclosure. | 8.8 | [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H>) \nCVE\u20112020\u20115984 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. | 7.8 | [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H>) \nCVE\u20112020\u20115985 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service. | 7.8 | [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H>) \nCVE\u20112020\u20115986 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service. | 7.8 | [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H>) \nCVE\u20112020\u20115987 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. | 7.3 | [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H>) \nCVE\u20112020\u20115988 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which allocated memory can be freed twice, which may lead to information disclosure or denial of service. | 7.0 | [AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>) \nCVE\u20112020\u20115989 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it can dereference a NULL pointer, which may lead to denial of service. | 5.5 | [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H>) \n \nThe NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration. \n\n### Security Updates for NVIDIA GPU Display Driver\n\nThe following table lists the NVIDIA software products affected, versions affected, and the updated version available from nvidia.com that includes this security update. Download the updates from the [NVIDIA Driver Downloads](<https://www.nvidia.com/Download/index.aspx>) page. \n\n#### Windows \n\n**CVE IDs Addressed** | **Software Product** | **Operating System** | **Driver Branch** | **Affected Driver Versions** | **Updated Driver Version** \n---|---|---|---|---|--- \nCVE\u20112020\u20115980 CVE\u20112020\u20115979 CVE\u20112020\u20115981 CVE\u20112020\u20115982 | GeForce | Windows | R455 | All versions prior to 456.71 | 456.71 \nQuadro, NVS | Windows | R455 | All versions prior to 456.71 | 456.71 \nR450 | All versions prior to 452.39 | 452.39 \nR440 | All versions prior to 443.66 | 443.66 \nR390 | All versions prior to 392.62 | 392.62 \nTesla | Windows | R450 | All versions prior to 452.39 | 452.39 \nR440 | All versions prior to 443.66 | \n\n443.66 \n \nR418 | All versions prior to 426.94 | \n\n426.94 \n \n**Notes:**\n\n * Your computer hardware vendor may provide you with Windows GPU display driver versions including 456.41, 452.11, and 446.29 which also contain the security updates. \n * CVE\u20112020\u20115979 does not affect the R390 driver branch.\n * The table above may not be a comprehensive list of all affected supported versions or branch releases and may be updated as more information becomes available.\n * Earlier software branch releases that support these products are also affected. If you are using an earlier branch release, upgrade to the latest branch release.\n\n### Security Updates for NVIDIA vGPU Software\n\nThe following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update. Log in to the [ NVIDIA Enterprise Application Hub](<https://nvid.nvidia.com/dashboard/>) to download updates from the NVIDIA Licensing Portal.\n\n**CVE IDs Addressed** | **vGPU Software Component** | **Operating System** | **Affected Versions** | **Updated Version** \n---|---|---|---|--- \n**vGPU Software** | **Driver** | **vGPU Software** | **Driver** \nCVE\u20112020\u20115983 CVE\u20112020\u20115984 CVE\u20112020\u20115985 CVE\u20112020\u20115986 CVE\u20112020\u20115987 CVE\u20112020\u20115988 | Virtual GPU Manager | Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, Nutanix AHV | 11.0 | 450.55 | 11.1 | 450.80 \n10.3 | 440.107 | 10.4 | 440.121 \n10.2 | 440.87 \n10.1 | 440.53 \n10.0 | 440.43 \n8.4 | 418.149 | 8.5 | 418.165.01 \n8.3 | 418.130 \n8.2 | 418.109 \n8.1 | 418.92 \n8.0 | 418.66 \n \n**Notes:**\n\n * The table above may not be a comprehensive list of all affected supported versions or branch releases and may be updated as more information becomes available.\n * Earlier software branch releases that support these products are also affected. If you are using an earlier branch release, upgrade to the latest branch release.\n\n### \n\n### Mitigations\n\nSee Security Updates for NVIDIA GPU Display Driver or Security Updates for NVIDIA vGPU Software for the version to install.\n\n### Acknowledgements\n\nNVIDIA thanks the following individuals for reporting the issues:\n\n * CVE\u20112020\u20115979 - Jo Hemmerlein of Microsoft\n * CVE\u20112020\u20115980 - Andy Gill of Pen Test Partners LLP\n * CVE\u20112020\u20115981 - Piotr Bania of Cisco Talos\n * CVE-2020-5983 - NVIDIA Product Security Team\n * CVE-2020-5986 - NVIDIA Product Security Team\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-10-10T00:00:00", "type": "nvidia", "title": "Security Bulletin: NVIDIA GPU Display Driver - September 2020", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5979", "CVE-2020-5980", "CVE-2020-5981", "CVE-2020-5982", "CVE-2020-5983", "CVE-2020-5984", "CVE-2020-5985", "CVE-2020-5986", "CVE-2020-5987", "CVE-2020-5988", "CVE-2020-5989"], "modified": "2020-10-10T00:00:00", "id": "NVIDIA:5075", "href": "https://nvidia.custhelp.com/app/answers/detail/a_id/5075", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2023-02-09T15:26:29", "description": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service.", "cvss3": {"exploitabilityScore": 0.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "baseScore": 4.4, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-10-02T19:15:00", "type": "cve", "title": "CVE-2020-5982", "cwe": ["CWE-770"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5982"], "modified": "2020-10-09T18:07:00", "cpe": ["cpe:/a:nvidia:virtual_gpu_manager:*"], "id": "CVE-2020-5982", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5982", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:26:27", "description": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-10-02T19:15:00", "type": "cve", "title": "CVE-2020-5981", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5981"], "modified": "2020-10-09T18:06:00", "cpe": ["cpe:/a:nvidia:virtual_gpu_manager:*"], "id": "CVE-2020-5981", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5981", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:26:27", "description": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in multiple components in which a securely loaded system DLL will load its dependencies in an insecure fashion, which may lead to code execution or denial of service.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-10-02T19:15:00", "type": "cve", "title": "CVE-2020-5980", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5980"], "modified": "2020-10-09T17:16:00", "cpe": ["cpe:/a:nvidia:virtual_gpu_manager:*"], "id": "CVE-2020-5980", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5980", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:26:27", "description": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-10-02T19:15:00", "type": "cve", "title": "CVE-2020-5979", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5979"], "modified": "2020-10-09T16:59:00", "cpe": ["cpe:/a:nvidia:virtual_gpu_manager:*"], "id": "CVE-2020-5979", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5979", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*"]}], "pentestpartners": [{"lastseen": "2020-10-10T10:00:39", "description": "### \n\n### What is NVIDIA SMI?\n\n\n\nThe NVIDIA System Management Interface (nvidia-smi) is a command line utility, based on top of the [NVIDIA Management Library (NVML)](<https://developer.nvidia.com/nvidia-management-library-nvml>), intended to aid in the management and monitoring of NVIDIA GPU devices.\n\nThis utility allows administrators to query GPU device state and with the appropriate privileges, permits administrators to modify GPU device state.\n\n\n\nIt comes pre-bundled with all NVIDIA drivers and as a result, is probably installed on your machine if you've got an NVIDIA graphics card in your device.\n\n### What is DLL Hijacking?\n\nDynamic-link library (DLL) search order hijacking, often shortened to DLL hijacking, is a process of exploiting execution flow of an application via external DLLs. Essentially it is possible to force an application to load a malicious DLL by hijacking the search order used to load legitimate content.\n\nIf a vulnerable application is configured to run at a higher privilege level, then the malicious DLL that is loaded will also be executed at a higher level, thus achieving escalation of privilege. Often the application will behave no differently because malicious DLLs may also be configured to load the legitimate DLLs they were meant to replace or where a DLL doesn't exist.\n\n### Finding The Issue\n\nWhile playing around with SpecterOps' [automated DLL hijacking discovery](<https://posts.specterops.io/automating-dll-hijack-discovery-81c4295904b0>), I found an NVIDIA DLL what was vulnerable to hijack.\n\nThe issue was found by leveraging Sysinternals [Process Explorer](<https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer>), to search through running processes for all DLLs loaded and called by running applications. The following steps can be taken:\n\n1) Open [Process Monitor](<https://docs.microsoft.com/en-us/sysinternals/downloads/procmon>) with the following filters, to identify potentially vulnerable applications and binaries.\n\n * **Result** contains _NOT FOUND_\n * **Path** ends with _.dll_\n\n\n\n2) Export the running list to a CSV then leverage [slyd0g](<https://github.com/slyd0g>)'s Get-PotentialDLLHijack script that can be [found here](<https://github.com/slyd0g/DLLHijackTest/blob/master/Get-PotentialDLLHijack.ps1>).\n\n\n\n3) Following execution against the CSV it was found that nvidia-smi along with a few other binaries were vulnerable:\n \n \n Get-PotentialDLLHijack -CSVPath .\\ProcessList.CSV -MaliciousDLLPath .\\maliciousDLL.dll -ProcessPath \"C:\\Program Files\\NVIDIA Corporation\\NVSMI\\nvidia-smi.exe\"\n\nThe process nvidia-smi.exe attempted to read the following DLL:\n \n \n C:\\Program Files\\NVIDIA Corporation\\NVSMI\\MSASN1.dll\n\nHowever as the DLL does not exist, we as the attacker can replace it with our own malicious one and hijack the path of execution so that the binary calls our DLL instead.\n \n \n Copy-Item maliciousDLL.dll C:\\Program Files\\NVIDIA Corporation\\NVSMI\\MSASN1.dll\n\nThen by stopping the nvidia-smi.exe process, we can then start it with our newly created malicious DLL. The contents of which can be anything, in the case of this proof of concept I have used cobalt strike shellcode to illustrate the execution of attacker-controlled code, this technique can be leveraged for persistence.\n\n\n\n### Fixing The Issue\n\nNVIDIA have released a patch for the issue that can be found [here](<https://www.nvidia.com/Download/index.aspx>). Apply this or alternatively uninstall nvidia-smi if not required.\n\n### Disclosure Timeline\n\n * 2020-07-01 Discovered and reported finding to NVIDIA PSIRT\n * 2020-07-02 NVIDIA confirmed the issue as valid and began investigating\n * 2020-08-18 NVIDIA confirmed that the bug would be fixed in their next GPU Security Rollout update to be released on September 30th\n * 2020-10-01 Findings published and NVIDIA issued a fix [released in the bulletin](<https://nvidia.custhelp.com/app/answers/detail/a_id/5075>), CVE-2020-5980\n\nThe post [DLL Hijacking in NVIDIA SMI](<https://www.pentestpartners.com/security-blog/dll-hijacking-in-nvidia-smi/>) first appeared on [Pen Test Partners](<https://www.pentestpartners.com/>).", "cvss3": {}, "published": "2020-10-01T05:39:30", "type": "pentestpartners", "title": "DLL Hijacking in NVIDIA SMI", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2020-5980"], "modified": "2020-10-01T05:39:30", "id": "PENTESTPARTNERS:E69F942FAA1C98EC0E9BECFB29F6D937", "href": "https://www.pentestpartners.com/security-blog/dll-hijacking-in-nvidia-smi/", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}]}