First published: Thu Jun 13 2024(Updated: )
NVIDIA vGPU software for Windows and Linux contains a vulnerability where unprivileged users could execute privileged operations on the host. A successful exploit of this vulnerability might lead to data tampering, escalation of privileges, and denial of service.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
NVIDIA vGPU Software | <13.11 | |
NVIDIA vGPU Software | >=14.0<16.6 | |
NVIDIA vGPU Software | >=17.0<17.2 | |
Any of | ||
VMware vSphere | ||
Ubuntu | ||
Citrix Hypervisor | ||
Red Hat Enterprise Linux Kernel-based Virtual Machine | ||
All of | ||
NVIDIA Cloud Gaming | <555.52.04 | |
Any of | ||
Red Hat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
All of | ||
NVIDIA vGPU Software | <17.2 | |
Microsoft Azure Stack HCI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0085 is considered a high severity vulnerability that can lead to data tampering and privilege escalation.
To fix CVE-2024-0085, you should update NVIDIA vGPU software to the latest version available that addresses this vulnerability.
CVE-2024-0085 allows unprivileged users to execute privileged operations on the host, leading to potential data tampering and denial of service.
CVE-2024-0085 affects NVIDIA vGPU software versions up to 13.11 and between 14.0 to 17.2.
Yes, the exploitation of CVE-2024-0085 can result in denial of service conditions.