7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
11.7%
NVIDIA has released a software security update for NVIDIA GPU Display Driver. This update addresses issues that may lead to code execution, denial of service, escalation of privileges, and information disclosure. To protect your system, download and install this software update through the NVIDIA Driver Downloads page or, for the vGPU software update, through the NVIDIA Licensing Portal. Go to NVIDIA Product Security.
This section provides a summary of potential vulnerabilities that this security update addresses and their impact. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.
CVE IDs | Description | Base Score | Vector |
---|---|---|---|
CVE‑2021‑1074 | NVIDIA Windows GPU Display Driver installer contains a vulnerability where an attacker with local unprivileged system access may be able to replace an application resource with malicious files. This attack requires a user with system administration rights to execute the installer and requires the attacker to replace the files in a very short time window between file integrity validation and execution. Such an attack may lead to code execution, escalation of privileges, denial of service, and information disclosure. | 7.3 | AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
CVE‑2021‑1075 | NVIDIA Windows GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the program dereferences a pointer that contains a location for memory that is no longer valid, which may lead to code execution, denial of service, or escalation of privileges. An attacker does not have any control over the information and may conduct only limited data modification. | 7.3 | AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H |
CVE‑2021‑1076 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption. |
6.6
| AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
CVE‑2021‑1077 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where the software uses a reference count to manage a resource that is incorrectly updated, which may lead to denial of service. | 6.6 | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
CVE‑2021‑1078 |
NVIDIA Windows GPU Display Driver for Windows contains a vulnerability in the kernel driver (nvlddmkm.sys) where a NULL pointer dereference may lead to system crash.
| 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.
CVE IDs | Description | Base Score | Vector |
---|---|---|---|
CVE‑2021‑1080 | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which certain input data is not validated, which may lead to information disclosure, tampering of data, or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2021‑1081 | NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2021‑1082 | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2021‑1083 | NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2021‑1084 | NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE‑2021‑1085 | NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to write to a shared memory location and manipulate the data after the data has been validated, which may lead to denial of service, escalation of privileges, and information disclosure but attacker doesn’t have control over what information is obtained. | 7.3 | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
CVE‑2021‑1086 | NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin) where it allows guests to control unauthorized resources, which may lead to integrity and confidentiality loss or information disclosure. | 7.1 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
CVE‑2021‑1087 | NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), which could allow an attacker to retrieve information that could lead to a Address Space Layout Randomization (ASLR) bypass. | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
This section provides details of the security update for each affected operating system. Download the update for your operating system from the NVIDIA Driver Downloads page.
The following table lists the CVE IDs addressed by the update in each driver branch.
Driver Branch | CVE IDs Addressed |
---|---|
R465, R418 | CVE‑2021‑1075, CVE‑2021‑1076, CVE‑2021‑1078 |
R460, R450 | CVE‑2021‑1075, CVE‑2021‑1076, CVE‑2021‑1077, CVE‑2021‑1078 |
R390 | CVE‑2021‑1074, CVE‑2021‑1075, CVE‑2021‑1076, CVE‑2021‑1078 |
The following table lists the NVIDIA software products affected, versions affected, and the updated driver versions available from nvidia.com that address the CVE IDs listed above.
Software Product | Operating System | Driver Branch | Affected Versions | Updated Driver Version |
---|---|---|---|---|
GeForce | Windows | R465 | All versions prior to 466.11 | 466.11 |
R460 | All versions prior to 462.31 | 462.31 | ||
NVIDIA RTX/Quadro, NVS | Windows | R465 | All versions prior to 466.11 | 466.11 |
R460 | All versions prior to 462.31 | 462.31 | ||
R450 | All versions prior to 452.96 | 452.96 | ||
R390 | All versions prior to 392.65 | 392.65 | ||
Tesla | Windows | R460 | All versions prior to 462.31 | 462.31 |
R450 | All versions prior to 452.96 | 452.96 | ||
R418 | All versions prior to 427.33 | 427.33 |
The following table lists the CVE IDs addressed by the update in each driver branch.
Driver Branch | CVE IDs Addressed |
---|---|
R465, R418, R390 | CVE‑2021‑1076 |
R460, R450 | CVE‑2021‑1076, CVE‑2021‑1077 |
The following table lists the NVIDIA software products affected, versions affected, and the updated driver versions available from nvidia.com that address the CVE IDs listed above.
Software Product | Operating System | Driver Branch | Affected Versions | Updated Driver Version |
---|---|---|---|---|
GeForce NVIDIA RTX/Quadro, NVS | Linux | R465 | All versions prior to 465.24.02 | 465.24.02 |
R460 | All versions prior to 460.73.01 | 460.73.01 | ||
R450 | All versions prior to 450.119.03 | 450.119.03 | ||
R390 | All versions prior to 390.143 | 390.143 | ||
Tesla | Linux | R460 | All versions prior to 460.73.01 | 460.73.01 |
R450 | All versions prior to 450.119.03 | 450.119.03 | ||
R418 | All versions prior to 418.197.02 | 418.197.02 |
Your computer hardware vendor may provide you with Windows GPU display driver versions, including 465.99 and 462.30, which also contain the security updates.
The tables above may not be a comprehensive list of all affected supported versions or branch releases and may be updated as more information becomes available.
Earlier software branch releases that support these products are also affected. If you are using an earlier branch release, upgrade to the latest branch release.
The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update. Log in to the NVIDIA Enterprise Application Hub to download updates from the NVIDIA Licensing Portal.
CVE IDs Addressed | vGPU Software Component | Operating System | Affected Versions | Updated Version |
---|---|---|---|---|
vGPU Software | Driver | vGPU Software | Driver | |
CVE‑2021‑1075 CVE‑2021‑1076 CVE‑2021‑1077 CVE‑2021‑1078 CVE‑2021‑1081 CVE‑2021‑1083 CVE‑2021‑1084 | vGPU software (guest driver) | Windows | All versions prior to 12.2 | All versions prior to 462.31 |
All versions prior to 11.4 | All versions prior to 452.96 | 11.4 | 452.96 | |
CVE‑2021‑1076 CVE‑2021‑1077 CVE‑2021‑1081 CVE‑2021‑1083 CVE‑2021‑1084 | vGPU software (guest driver) | Linux | All versions prior to 12.2 | All versions prior to 460.73.01 |
All versions prior to 11.4 | All versions prior to 450.119.03 | 11.4 | 450.119.03 | |
CVE‑2021‑1080 CVE‑2021‑1081 CVE‑2021‑1082 CVE‑2021‑1083 CVE‑2021‑1084 CVE‑2021‑1085 CVE‑2021‑1086 CVE‑2021‑1087 | vGPU software (Virtual GPU Manager) | Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM | All versions prior to 12.2 | All versions prior to 460.73.02 |
All versions prior to 11.4 | All versions prior to 450.124 | 11.4 | 450.124 | |
CVE‑2021‑1075 CVE‑2021‑1076 CVE‑2021‑1078 CVE‑2021‑1081 | vGPU software (guest driver) | Windows | All versions prior to 8.7 | All versions prior to 427.33 |
CVE‑2021‑1076 CVE‑2021‑1081 | vGPU software (guest driver) | Linux | All versions prior to 8.7 | All versions prior to 418.197.02 |
CVE‑2021‑1080 CVE‑2021‑1081 CVE‑2021‑1082 CVE‑2021‑1085 CVE‑2021‑1086 CVE‑2021‑1087 | vGPU software (Virtual GPU Manager) | Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, Nutanix AHV | All versions prior to 8.7 | All versions prior to 418.196 |
The table above may not be a comprehensive list of all affected supported versions or branch releases and may be updated as more information becomes available.
Earlier software branch releases that support these products are also affected. If you are using an earlier branch release, upgrade to the latest branch release.
See Security Updates for NVIDIA GPU Display Driver or Security Updates for NVIDIA vGPU Software for the version to install.
NVIDIA thanks Wenxiang Qian of Tencent Blade Team for reporting CVE‑2021‑1082, CVE‑2021‑1084, and CVE‑2021‑1087.
Issues CVE‑2021‑1081 and CVE‑2021‑1083 were discovered by the NVIDIA Product Security Team.
CPE | Name | Operator | Version |
---|---|---|---|
geforce | lt | 466.11 | |
geforce | lt | 462.31 | |
nvidia rtx/quadro | lt | 466.11 | |
nvs | lt | 466.11 | |
nvidia rtx/quadro | lt | 462.31 | |
nvs | lt | 462.31 | |
nvidia rtx/quadro | lt | 452.96 | |
nvs | lt | 452.96 | |
nvidia rtx/quadro | lt | 392.65 | |
nvs | lt | 392.65 |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
11.7%