Vulnerabilities in NVIDIA Windows GPU Display Driver (May 2022) for Windows
Reporter | Title | Published | Views | Family All 70 |
---|---|---|---|---|
Hewlett-Packard | NVIDIA GPU Display Driver May 2022 Security Update | 2 Jun 202200:00 | β | hp |
Malwarebytes | Update now! Nvidia released fixes for 10 flaws in Windows GPU drivers | 23 May 202211:15 | β | malwarebytes |
Nvidia | Security Bulletin: NVIDIA GPU Display Driver - May 2022 | 16 May 202200:00 | β | nvidia |
Tenable Nessus | NVIDIA Linux GPU Display Driver (May 2022) | 22 Jul 202200:00 | β | nessus |
Tenable Nessus | GLSA-202310-02 : NVIDIA Drivers: Multiple Vulnerabilities | 3 Oct 202300:00 | β | nessus |
OpenVAS | Mageia: Security Advisory (MGASA-2022-0198) | 23 May 202200:00 | β | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2022-0197) | 23 May 202200:00 | β | openvas |
Mageia | Updated nvidia-current packages fix security vulnerabilities | 22 May 202214:26 | β | mageia |
Mageia | Updated nvidia390 packages fix security vulnerabilities | 22 May 202214:26 | β | mageia |
NVD | CVE-2022-28186 | 17 May 202220:15 | β | nvd |
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(163399);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/08");
script_cve_id(
"CVE-2022-28181",
"CVE-2022-28182",
"CVE-2022-28183",
"CVE-2022-28184",
"CVE-2022-28185",
"CVE-2022-28186",
"CVE-2022-28187",
"CVE-2022-28188",
"CVE-2022-28189",
"CVE-2022-28190"
);
script_xref(name:"IAVA", value:"2022-A-0281-S");
script_name(english:"NVIDIA Windows GPU Display Driver (May 2022)");
script_set_attribute(attribute:"synopsis", value:
"The NVIDIA GPU display driver software on the remote Windows host is missing a vendor-supplied patch.");
script_set_attribute(attribute:"description", value:
"A display driver installed on the remote Windows host is affected by a vulnerability:
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an unprivileged
regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead
to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The
scope of the impact may extend to other components. (CVE-2022-28181)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll),
where an unauthorized attacker on the network can cause an out-of-bounds write through a specially crafted shader,
which may lead to code execution to cause denial of service, escalation of privileges, information disclosure, and
data tampering. The scope of the impact may extend to other components. (CVE-2022-28182)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an unprivileged
regular user can cause an out-of-bounds read, which may lead to denial of service and information disclosure.
(CVE-2022-28183)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for
DxgkDdiEscape, where an unprivileged regular user can access administrator-privileged registers, which may lead to
denial of service, information disclosure, and data tampering. (CVE-2022-28184)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the ECC layer, where an unprivileged regular user
can cause an out-of-bounds write, which may lead to denial of service and data tampering. (CVE-2022-28185)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for
DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the
input has the properties that are required to process the data safely and correctly, which may lead to denial of
service or data tampering. (CVE-2022-28186)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where the
memory management software does not release a resource after its effective lifetime has ended, which may lead to
denial of service. (CVE-2022-28187)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for
DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the
input has the properties that are required to process the data safely and correctly, which may lead to denial of
service. (CVE-2022-28188)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for
DxgkDdiEscape, where a NULL pointer dereference may lead to a system crash. (CVE-2022-28189)
- NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for
DxgkDdiEscape, where improper input validation can cause denial of service. (CVE-2022-28190)
Note that Nessus has not attempted to exploit these issues but has instead relied only on the driver's
self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://nvidia.custhelp.com/app/answers/detail/a_id/5353");
script_set_attribute(attribute:"solution", value:
"Upgrade the NVIDIA graphics driver in accordance with the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-28181");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/05/24");
script_set_attribute(attribute:"patch_publication_date", value:"2022/05/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/07/22");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:nvidia:gpu_driver");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("wmi_enum_display_drivers.nbin");
script_require_keys("WMI/DisplayDrivers/NVIDIA", "Settings/ParanoidReport");
exit(0);
}
include('vcf_extras_nvidia.inc');
var app_info = vcf::nvidia_gpu::get_app_info(win_local:TRUE);
if (report_paranoia < 2)
audit(AUDIT_PARANOID);
var constraints = [
{'min_version': '450', 'fixed_version': '453.51', 'gpumodel':'tesla'},
{'min_version': '470', 'fixed_version': '473.47', 'gpumodel':['nvs', 'quadro', 'tesla']},
{'min_version': '510', 'fixed_version': '512.77', 'gpumodel':'geforce'},
{'min_version': '510', 'fixed_version': '512.96', 'gpumodel':'studio'},
{'min_version': '510', 'fixed_version': '512.78', 'gpumodel':['quadro', 'nvs', 'tesla']}
];
vcf::nvidia_gpu::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_WARNING
);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo