Thursday, March 6, 2025
HomeCVE/vulnerabilityNVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

Published on

SIEM as a Service

Follow Us on Google News

NVIDIA has issued an urgent security bulletin urging customers using its Hopper HGX 8-GPU High-Performance Computing (HMC) systems to immediately install firmware updates addressing two critical vulnerabilities.

Released on February 28, 2025, the patches target flaws that could allow attackers to execute malicious code, escalate privileges, or cripple enterprise GPU infrastructure through denial-of-service (DoS) attacks.

The advisories highlight risks to AI data centers, cloud platforms, and scientific computing environments relying on these high-end accelerators.

CVE-2024-0114: Systemic Compromise via BMC Exploit (CVSS 8.1)

The highest-risk vulnerability, tracked as CVE-2024-0114 resides in the Hopper HGX Management Controller (HMC)—a critical component overseeing GPU fleet operations.

Attackers with administrative access to a system’s Baseboard Management Controller (BMC) could exploit this flaw to gain unfettered HMC administrator privileges. NVIDIA’s advisory warns that successful exploitation enables:

  • Remote code execution on compromised GPUs
  • Permanent denial of service through hardware state manipulation
  • Sensitive data exfiltration, including AI model weights or training datasets
  • Privilege escalation across multi-tenant cloud deployments

The attack vector requires local network access but poses particular danger in shared infrastructure environments where BMC credentials might be exposed.

NVIDIA emphasizes that organizations using default BMC configurations face heightened risk.

CVE-2024-0141: vBIOS Tampering Enables DoS (CVSS 6.8)

A secondary vulnerability, CVE-2024-0141, affects the GPU vBIOS firmware governing low-level hardware operations.

Malicious actors with tenant-level GPU access could write malicious values to unsupported registers, forcing GPUs into unrecoverable failure states.

While rated medium severity, this flaw threatens cloud service providers by allowing rogue users to destabilize shared GPU resources.

The vBIOS exploit requires no physical access, making it viable in virtualized environments. NVIDIA notes that attacks would bypass traditional virtualization security layers, potentially crashing entire GPU partitions.

Mitigation and Industry Response

NVIDIA has released firmware version 1.6.0 to address both vulnerabilities, with backward compatibility for systems running earlier HMC builds. The company advises:

  1. Immediate installation of updates across all affected Hopper HGX deployments
  2. Hardening BMC configurations to minimize attack surfaces
  3. Auditing access controls for GPU management interfaces

“These patches are non-optional for any organization using Hopper systems in production,” said Priya Balasubramanian, lead security engineer at NVIDIA’s Product Security Incident Response Team (PSIRT).

“The combination of code execution and hardware bricking capabilities creates unacceptable operational risks.”

The disclosure follows increased scrutiny of GPU security as AI workloads expand. Researchers warn that compromised accelerators could enable model theft, training data poisoning, or supply-chain attacks across ML platforms.

With over 80% of AI data centers utilizing NVIDIA GPUs, timely patching remains critical to global infrastructure integrity.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Technical Analysis Released on Bybit Hot Wallet Exploit

Cryptocurrency exchange Bybit suffered a sophisticated smart contract exploit on February 21, 2025, resulting...

Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption

Google's FLARE team has released GoStringUngarbler, an open-source tool designed to dismantle string obfuscation in...

Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform

AI Soft has announced the upcoming public release of Alli AI, an advanced artificial...

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Technical Analysis Released on Bybit Hot Wallet Exploit

Cryptocurrency exchange Bybit suffered a sophisticated smart contract exploit on February 21, 2025, resulting...

Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption

Google's FLARE team has released GoStringUngarbler, an open-source tool designed to dismantle string obfuscation in...

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...