First published: Fri Jan 12 2024(Updated: )
NVIDIA DGX A100 baseboard management controller (BMC) contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
NVIDIA DGX Station A100 firmware | <00.22.05 | |
NVIDIA DGX A100 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31029 is considered a critical vulnerability due to the potential for stack overflow and arbitrary code execution.
To fix CVE-2023-31029, you should update the NVIDIA DGX A100 firmware to version 00.22.05 or later.
CVE-2023-31029 affects systems running the NVIDIA DGX A100 firmware prior to version 00.22.05.
An attacker exploiting CVE-2023-31029 could gain the ability to execute arbitrary code on the affected system.
No, CVE-2023-31029 can be exploited by an unauthenticated attacker.