7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%
NVIDIA has released a software security update for NVIDIA GPU Display Driver to address the issues that are disclosed in this bulletin.
To protect your system, download and install this software update through the NVIDIA Driver Downloads page or, for the vGPU software and Cloud Gaming updates, through the NVIDIA Licensing Portal.
Go to NVIDIA Product Security.
This section provides a summary of potential vulnerabilities that this security update addresses and their impact. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.
CVE ID | Description | Vector | Base Score | Severity | CWE | Impacts |
---|---|---|---|---|---|---|
CVE‑2024‑0071 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 7.8 | High | CWE‑125 | Code execution, denial of service, escalation of privileges, information disclosure, data tampering |
CVE‑2024‑0073 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer when the driver is performing an operation at a privilege level that is higher than the minimum level required. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 7.8 | High | CWE‑250 | Code execution, denial of service, escalation of privileges, information disclosure, data tampering |
CVE‑2024‑0074 | NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering. | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H | 7.1 | High | CWE‑788 | Denial of service, data tampering |
CVE‑2024‑0078 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service. | AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H | 6.5 | Medium | CWE‑476 | Denial of service |
CVE‑2024‑0075 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user may cause a NULL-pointer dereference by accessing passed parameters the validity of which has not been checked. A successful exploit of this vulnerability may lead to denial of service and limited information disclosure. | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H | 6.1 | Medium | CWE-476 | Denial of service, limited information disclosure |
CVE‑2022‑42265 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause integer overflow, which may lead to denial of service, information disclosure, and data tampering. | AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L | 5.3 | Medium | CWE‑190 | Denial of service, information disclosure, and data tampering |
CVE ID | Description | Vector | Base Score | Severity | CWE | Impacts |
---|---|---|---|---|---|---|
CVE‑2024‑0077 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 7.8 | High | CWE‑285 | Code execution, denial of service, escalation of privileges, information disclosure, data tampering |
CVE‑024‑0079 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest VM can cause a NULL-pointer dereference in the host. A successful exploit of this vulnerability may lead to denial of service. | AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H | 6.5 | Medium | CWE‑476 | Denial of service |
The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.
The following table lists the CVE IDs addressed by the update in each Windows driver branch.
Windows Driver Branch | CVE IDs Addressed |
---|---|
R550, R545, R535 | CVE‑2024‑0071, CVE‑2024‑0073, CVE‑2024‑0078, CVE‑2024‑0075, |
R470 | CVE‑2024‑0071, CVE‑2024‑0073, CVE‑2024‑0078, CVE‑2022‑42265 |
The following table lists the NVIDIA software products affected, Windows driver versions affected, and the updated version available from nvidia.com that includes this security update. Download the updates from the NVIDIA Driver Downloads page.
Software Product | Operating System | Driver Branch | Affected Driver Versions | Updated Driver Version |
---|---|---|---|---|
GeForce | Windows | R550 | All driver versions prior to 551.61 | 551.61 |
Windows 10 and 11 | R470 | All driver versions prior to 474.82 for support of GeForce Kepler desktop | 474.82 | |
Windows 7 and 8.x | R470 | All driver versions prior to 474.89 | 474.89 | |
Studio | Windows | R550 | All driver versions prior to 551.61 | 551.61 |
NVIDIA RTX, Quadro, NVS | Windows | R550 | All driver versions prior to 551.61 | 551.61 |
R535 | All driver versions prior to 538.33 | 538.33 | ||
R470 | All driver versions prior to 474.82 | 474.82 | ||
Tesla | Windows | R550 | All driver versions prior to 551.61 | 551.61 |
R535 | All driver versions prior to 538.33 | 538.33 | ||
R470 | All driver versions prior to 474.82 | 474.82 |
The following table lists the CVE IDs addressed by the update in each Linux driver branch.
Linux Driver Branch | CVE IDs Addressed |
---|---|
R550, R545, R535 | CVE‑2024‑0074, CVE‑2024‑0075 |
R470 | CVE‑2024‑0074, CVE-2022-42265 |
The following table lists the NVIDIA software products affected, Linux driver versions affected, and the updated version available from nvidia.com that includes this security update. Download the updates from the NVIDIA Driver Downloads page.
Software Product | Operating System | Driver Branch | Affected Driver Versions | Updated Driver Version |
---|---|---|---|---|
GeForce | Linux | R550 | All driver versions prior to 550.54.14 | 550.54.14 |
R535 | All driver versions prior to 535.161.07 | 535.161.07 | ||
R470 | All driver versions prior to 470.239.06 | 470.239.06 | ||
NVIDIA RTX, Quadro, NVS | Linux | R550 | All driver versions prior to 550.54.14 | 550.54.14 |
R535 | All driver versions prior to 535.161.07 | 535.161.07 | ||
R470 | All driver versions prior to 470.239.06 | 470.239.06 | ||
Tesla | Linux | R550 | All driver versions prior to 550.54.14 | 550.54.14 |
R535 | All driver versions prior to 535.161.07 | 535.161.07 | ||
R470 | All driver versions prior to 470.239.06 | 470.239.06 |
The following table lists the CVE IDs addressed by the update in each Windows vGPU driver branch.
Windows Driver Branch | CVE IDs Addressed |
---|---|
R535 | CVE‑2024‑0071, CVE‑2024‑0073, CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0078 |
R470 | CVE‑2024‑0071, CVE‑2024‑0073, CVE‑2024‑0074, CVE‑2024‑0078, CVE‑2022‑42265 |
The following table lists the CVE IDs addressed by the update in each Linux vGPU driver branch.
Linux Driver Branch | CVE IDs Addressed |
---|---|
R535 | CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0078 |
R470 | CVE‑2024‑0074, CVE‑2024‑0078, CVE‑2022‑42265 |
The following table lists the CVE IDs addressed by the update in each vGPU Manager driver branch.
vGPU Manager Driver Branch | CVE IDs Addressed |
---|---|
R535 | CVE‑2024‑0073, CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0077, CVE‑2024‑0078, CVE‑2024‑0079 |
R470 | CVE‑2024‑0073, CVE‑2024‑0074, CVE‑2024‑0077, CVE‑2024‑0078, CVE‑2022‑4226 |
The following table lists NVIDIA vGPU software components affected, versions affected, and the updated version that includes this security update.
CVE IDs Addressed | vGPU Software Component | Operating System | Affected Versions | Updated Version |
---|---|---|---|---|
vGPU Software | Driver | vGPU Software | Driver | |
CVE‑2024‑0071 | ||||
CVE‑2024‑0073 | ||||
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0078 | ||||
CVE‑2022‑42265 | Guest driver | Windows | All versions up to and including 16.3 | 538.15 |
All versions up to and including 13.9 | 474.64 | 13.10 | 474.82 | |
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0078 | ||||
CVE-2022-42265 | Guest driver | Linux | All versions up to and including 16.3 | 535.154.05 |
All versions up to and including 13.9 | 470.223.02 | 13.10 | 470.239.06 | |
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0077 | ||||
CVE‑2024‑0078 | ||||
CVE‑2024‑0079 | ||||
CVE‑2022‑42265 | Virtual GPU Manager | Citrix Hypervisor, | ||
VMware vSphere, Red Hat Enterprise Linux KVM, Ubuntu | All versions up to and including 16.3 | 535.154.02 | 16.4 | 535.161.05 |
All versions up to and including 13.9 | 470.223.02 | 13.10 | 470.239.01 | |
CVE‑2024‑0073 | ||||
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0077 | ||||
CVE‑2024‑0078 | ||||
CVE‑2024‑0079 | ||||
CVE‑2022‑42265 | Virtual GPU Manager | Azure Stack HCI | All versions up to and including 16.3 | 538.15 |
Notes:
The following table lists the CVE IDs addressed by the update in each Windows Cloud Gaming driver branch.
Windows Driver Branch | CVE IDs Addressed |
---|---|
R545 | CVE‑2024‑0071, CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0078 |
The following table lists the CVE IDs addressed by the update in each Linux Cloud Gaming driver branch.
Linux Driver Branch | CVE IDs Addressed |
---|---|
R545 | CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0078 |
The following table lists the CVE IDs addressed by the update in each Cloud Gaming Manager driver branch.
Gaming Manager Driver Branch
|
CVE IDs Addressed
—|—
R545 | CVE‑2024‑0073, CVE‑2024‑0074, CVE‑2024‑0075, CVE‑2024‑0077, CVE‑2024‑0078, CVE‑2024‑0079
The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update.
CVE IDs Addressed | Cloud Gaming Component | Operating System | Affected Versions | Updated Version |
---|---|---|---|---|
Cloud Gaming Software | Driver | Cloud Gaming Software | Driver | |
CVE‑2024‑0071 | ||||
CVE‑2024‑0073 | ||||
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0078 | ||||
CVE‑2022‑422657 | Guest driver | Windows | All versions up to and including the January 2024 release | 546.65 |
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0078 | ||||
CVE‑2022‑42265 | Guest driver | Linux | All versions up to and including the January 2024 release | 545.37.02 |
CVE‑2024‑0074 | ||||
CVE‑2024‑0075 | ||||
CVE‑2024‑0077 | ||||
CVE‑2024‑0078 | ||||
CVE‑2024‑0079 | ||||
CVE‑2022‑42265 | Virtual GPU Manager | Red Hat Enterprise Linux KVM, VMware vSphere | All versions prior to and including the January 2024 release | 545.37.02 |
NVIDIA thanks the following people for reporting the issues:
CVE‑2024‑0071: Piotr Bania - Cisco Talos
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%