First published: Fri Jan 08 2021(Updated: )
NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=8.0<8.6 | |
NVIDIA Virtual GPU Manager | >=11.0<11.3 | |
Citrix Hypervisor | ||
Nutanix Ahv | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1062 is a vulnerability in the NVIDIA vGPU manager that allows for tampering of data or denial of service due to a lack of input data length validation.
The severity of CVE-2021-1062 is high with a severity value of 7.1.
NVIDIA vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3) are affected by CVE-2021-1062.
CVE-2021-1062 can be exploited by manipulating input data length in the vGPU plugin of NVIDIA vGPU manager.
No, Citrix Hypervisor is not vulnerable to CVE-2021-1062.