First published: Fri Nov 18 2022(Updated: )
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Gpu Display Driver | >=471.11<473.81 | |
Nvidia Gpu Display Driver | >=516.25<516.94 | |
Nvidia Geforce | ||
NVIDIA Virtual GPU | >=11.0<11.8 | |
NVIDIA Virtual GPU | >=13.0<13.3 | |
NVIDIA Virtual GPU | =14.0 | |
Microsoft Windows | ||
Nvidia Cloud Gaming Guest | <516.94 | |
Nvidia Studio | ||
Nvidia Gpu Display Driver | >=511.09<513.46 | |
Nvidia Gpu Display Driver | >=451.48<453.64 | |
Nvidia Gpu Display Driver | >=471.11<472.81 | |
Nvidia Tesla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-31606.
The severity of CVE-2022-31606 is high with a severity value of 7.8.
NVIDIA GPU Display Driver for Windows versions 471.11 to 473.81 and 516.25 to 516.94 are affected.
An attacker with basic user capabilities can exploit this vulnerability to cause an out-of-bounds access in kernel mode.
Yes, NVIDIA has released a fix for this vulnerability. Please refer to the official NVIDIA support page for more information.