7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
41.3%
NVIDIA has released a software security update for NVIDIA GPU Display Driver. This update addresses issues that may lead to denial of service, escalation of privileges, or information disclosure. To protect your system, download and install this software update through the NVIDIA Driver Downloads page or, for the vGPU software update, through the NVIDIA Licensing Center. Go to NVIDIA Product Security.
CWE™ CVSS V3 CVE | Description | Base Score | Vector |
---|---|---|---|
CVE‑2019‑5690 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the size of an input buffer is not validated, which may lead to denial of service or escalation of privileges. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2019‑5691 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a NULL pointer is dereferenced, which may lead to denial of service or escalation of privileges. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2019‑5692 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the product uses untrusted input when calculating or using an array index, which may lead to escalation of privileges or denial of service. | 7.1 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
CVE‑2019‑5693 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) in which the program accesses or uses a pointer that has not been initialized, which may lead to denial of service. | 6.5 | AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
CVE‑2019‑5694 | NVIDIA Windows GPU Display Driver contains a vulnerability in NVIDIA Control Panel in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access. | 6.5 | AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
CVE‑2019‑5695 | NVIDIA Windows GPU Display Driver contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly load Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. | 6.5 | AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
CVE‑2019‑5696 | NVIDIA Virtual GPU Manager contains a vulnerability in which the provision of an incorrectly sized buffer by a guest VM leads to GPU out-of-bound access, which may lead to a denial of service. | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE‑2019‑5697 | NVIDIA Virtual GPU Manager contains a vulnerability in which it may grant a guest access to memory that it does not own, which may lead to information disclosure or denial of service. | 5.3 | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
CVE‑2019‑5698 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service. | 5.1 | AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.
The following table lists the NVIDIA software products affected, versions affected, and the updated version available from nvidia.com that includes this security update. Download the updates from the NVIDIA Driver Downloads page.
CVEs Addressed | Software Product | Operating System | Affected Versions | Updated Versions |
---|---|---|---|---|
CVE‑2019‑5690 CVE‑2019‑5691 CVE‑2019‑5692 CVE‑2019‑5693 CVE‑2019‑5695 | GeForce | Windows | All R440 versions prior to 441.12 | 441.12 |
Quadro, NVS | Windows | All R440 versions prior to 441.12 | 441.12 | |
All R430 versions prior to 431.98 | 431.98 | |||
All R418 versions prior to 426.32 | 426.32 | |||
Tesla | Windows | All R440 versions prior to 441.22 | 441.22 | |
All R418 versions prior to 426.32 | 426.32 | |||
CVE‑2019‑5690 CVE‑2019‑5691 CVE‑2019‑5692 CVE‑2019‑5693 CVE‑2019‑5694 CVE‑2019‑5695 | Quadro, NVS | Windows | All R390 versions prior to 392.58 | 392.58 |
Notes:
The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update. Log in to the NVIDIA Enterprise Application Hub to download updates from the NVIDIA Licensing Center.
CVEs Addressed | Software Product | Operating System | Affected Versions | Updated Version |
---|---|---|---|---|
vGPU Software | Driver | vGPU Software | Driver | |
CVE‑2019‑5698 | vGPU software (guest driver) | Windows | 9.1 | 431.79 |
9.0 | 431.02 | |||
8.1 | 426.04 | 8.2 | 426.26 | |
8.0 | 425.31 | |||
4.9 | 370.39 | 4.10 | 370.41 | |
CVE‑2019‑5698 | vGPU software (guest driver) | Linux | 9.1 | 430.46 |
9.0 | 430.30 | |||
8.1 | 418.92 | 8.2 | 418.109 | |
8.0 | 418.70 | |||
4.9 | 367.133 | 4.10 | 367.134 | |
CVE‑2019‑5696 CVE‑2019‑5697 CVE‑2019‑5698 | vGPU software (Virtual GPU Manager) | Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, Nutanix AHV | 9.1 | 430.46 |
9.0 | 430.27 | |||
8.1 | 418.92 | 8.2 | 418.109 | |
8.0 | 418.66 | |||
4.9 | 367.132 | 4.10 | 367.134 |
Notes:
None. See Security Updates for NVIDIA GPU Display Driver or Security Updates for NVIDIA vGPU Software for the version to install.
NVIDIA thanks Peleg Hadar of SafeBreach Labs for reporting the following issues:
NVIDIA thanks Lucas Pinheiro of Microsoft for reporting issue CVE-2019-5692.
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
41.3%