First published: Fri Jan 12 2024(Updated: )
NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause stack memory corruption by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
NVIDIA DGX A100 firmware | <00.22.05 | |
NVIDIA DGX A100 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31024 has a high severity rating due to its potential to allow arbitrary code execution.
To remediate CVE-2023-31024, update the NVIDIA DGX A100 firmware to a version greater than 00.22.05.
Organizations using the NVIDIA DGX A100 firmware version 00.22.05 or lower are affected by CVE-2023-31024.
An attacker exploiting CVE-2023-31024 can achieve arbitrary code execution and cause denial of service.
No, exploitation of CVE-2023-31024 can occur without authentication, making it particularly concerning.