NVIDIA has issued a critical security update to address multiple vulnerabilities in its GPU Display Driver and vGPU software, affecting both Windows and Linux systems.
Among these is CVE‑2024‑0149, a vulnerability in the NVIDIA GPU Display Driver for Linux that could allow attackers unauthorized access to files.
These vulnerabilities, disclosed in January 2025, pose risks such as denial of service (DoS), data tampering, information disclosure, and even code execution.
Users are strongly advised to update their drivers via the NVIDIA Driver Downloads page or the NVIDIA Licensing Portal for vGPU software.
The security update addresses seven key vulnerabilities, categorized by severity levels:
The vulnerabilities affect a broad range of NVIDIA products across different driver branches:
Windows Drivers: GeForce, NVIDIA RTX/Quadro/NVS, and Tesla GPUs are impacted across R535, R550, R560, R565, and R570 branches. Updated versions include R535 (539.19), R550 (553.62), and R570 (572.16).
Linux Drivers: Similar issues affect Linux drivers in branches R535, R550, and R570. Updated versions include R535 (535.230.02), R550 (550.144.03), and R570 (570.86.16).
For vGPU software users, affected components include guest drivers and Virtual GPU Manager across platforms like Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, and Azure Local.
NVIDIA recommends immediate installation of updated drivers to mitigate these risks.
Users should consult their IT professionals to evaluate their specific configurations and apply appropriate updates.
Acknowledgments were extended to researchers Xiaochen Zou and Wolfgang Frisch for reporting several vulnerabilities.
This update underscores the importance of proactive security measures in safeguarding systems against potential exploits targeting GPU hardware and virtualization environments.
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations by…
Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the notorious…
In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters…
The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer malware,…
A recent discovery by the Socket Research Team has unveiled a malicious PyPI package named…
A recent cybersecurity threat has emerged where unknown attackers are exploiting a critical remote code…