First published: Fri Dec 30 2022(Updated: )
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Jetson Linux | <32.7.2 | |
NVIDIA Jetson AGX Xavier | ||
Nvidia Jetson Agx Xavier 16gb | ||
Nvidia Jetson Agx Xavier 32gb | ||
Nvidia Jetson Agx Xavier 64gb | ||
Nvidia Jetson Agx Xavier 8gb | ||
Nvidia Jetson Agx Xavier Industrial | ||
NVIDIA Jetson TX1 | ||
NVIDIA Jetson TX2 | ||
Nvidia Jetson Tx2 4gb | ||
Nvidia Jetson Tx2 Nx | ||
Nvidia Jetson Tx2i | ||
Nvidia Jetson Xavier Nx | ||
Nvidia Jetson Xavier Nx 16gb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-42269 is high with a CVSS score of 7.9.
CVE-2022-42269 affects NVIDIA Trusted OS by allowing a highly privileged local attacker to cause information disclosure and compromise integrity.
The scope of impact for CVE-2022-42269 can extend to other components, in addition to NVIDIA Trusted OS.
To fix CVE-2022-42269, it is recommended to apply the necessary security updates provided by NVIDIA.
More information about CVE-2022-42269 can be found at the following reference: https://nvidia.custhelp.com/app/answers/detail/a_id/5417