First published: Wed Jul 21 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn't release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA vGPU Software | >=8.0<8.8 | |
NVIDIA vGPU Software | >=11.0<11.5 | |
NVIDIA vGPU Software | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1098 is rated as high due to the potential for information disclosure.
To fix CVE-2021-1098, update your NVIDIA vGPU software to the latest version that addresses this vulnerability.
NVIDIA vGPU versions from 8.0 to 8.8, 11.0 to 11.5, and 12.0 to 12.3 are affected by CVE-2021-1098.
Yes, CVE-2021-1098 allows a malicious guest to exploit resources and potentially perform operations that could impact other guests.
CVE-2021-1098 can be considered an insider threat vulnerability as it requires a malicious actor within a virtualized environment to exploit its weaknesses.