7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
11.7%
NVIDIA has released a software security update for NVIDIA® GPU Display Driver. This update addresses issues that may lead to denial of service, code execution, escalation of privileges, or information disclosure. To protect your system, download and install this software update from the NVIDIA Driver Downloads page or, for the vGPU software update, through the NVIDIA Licensing Portal. Go to NVIDIA Product Security.
This section provides a summary of potential vulnerabilities and their impact that this security update addresses. Descriptions use CWE™, and base scores and vectors use CVSS v3.0 standards.
CVE IDs | Description | Base Score | Vector |
---|---|---|---|
CVE‑2020‑5979 | NVIDIA Display Driver contains a vulnerability in the Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑5980
| NVIDIA Windows GPU Display Driver contains a vulnerability in multiple components in which a securely loaded system DLL will load its dependencies in an insecure fashion, which may lead to code execution or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE‑2020‑5981 | NVIDIA Windows GPU Display Driver contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll
), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution. | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE‑2020‑5982 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys
) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service. | 4.4 | AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE IDs | Description | Base Score | Vector |
---|---|---|---|
CVE‑2020‑5983 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin and the host driver kernel module, in which the potential exists to write to a memory location that is outside the intended boundary of the frame buffer memory allocated to guest operating systems, which may lead to denial of service or information disclosure. | 8.8 | AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
CVE‑2020‑5984 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑5985 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑5986 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑5987 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. | 7.3 | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
CVE‑2020‑5988 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which allocated memory can be freed twice, which may lead to information disclosure or denial of service. | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑5989 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it can dereference a NULL pointer, which may lead to denial of service. | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.
The following table lists the NVIDIA software products affected, versions affected, and the updated version available from nvidia.com that includes this security update. Download the updates from the NVIDIA Driver Downloads page.
CVE IDs Addressed | Software Product | Operating System | Driver Branch | Affected Driver Versions | Updated Driver Version |
---|---|---|---|---|---|
CVE‑2020‑5980 CVE‑2020‑5979 CVE‑2020‑5981 CVE‑2020‑5982 | GeForce | Windows | R455 | All versions prior to 456.71 | 456.71 |
Quadro, NVS | Windows | R455 | All versions prior to 456.71 | 456.71 | |
R450 | All versions prior to 452.39 | 452.39 | |||
R440 | All versions prior to 443.66 | 443.66 | |||
R390 | All versions prior to 392.62 | 392.62 | |||
Tesla | Windows | R450 | All versions prior to 452.39 | 452.39 | |
R440 | All versions prior to 443.66 |
443.66
R418 | All versions prior to 426.94 |
426.94
Notes:
The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update. Log in to the NVIDIA Enterprise Application Hub to download updates from the NVIDIA Licensing Portal.
CVE IDs Addressed | vGPU Software Component | Operating System | Affected Versions | Updated Version |
---|---|---|---|---|
vGPU Software | Driver | vGPU Software | Driver | |
CVE‑2020‑5983 CVE‑2020‑5984 CVE‑2020‑5985 CVE‑2020‑5986 CVE‑2020‑5987 CVE‑2020‑5988 | Virtual GPU Manager | Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, Nutanix AHV | 11.0 | 450.55 |
10.3 | 440.107 | 10.4 | 440.121 | |
10.2 | 440.87 | |||
10.1 | 440.53 | |||
10.0 | 440.43 | |||
8.4 | 418.149 | 8.5 | 418.165.01 | |
8.3 | 418.130 | |||
8.2 | 418.109 | |||
8.1 | 418.92 | |||
8.0 | 418.66 |
Notes:
See Security Updates for NVIDIA GPU Display Driver or Security Updates for NVIDIA vGPU Software for the version to install.
NVIDIA thanks the following individuals for reporting the issues:
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
11.7%