Tuesday, March 25, 2025
HomeCVE/vulnerabilityNVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

Published on

SIEM as a Service

Follow Us on Google News

NVIDIA has issued an urgent security bulletin urging customers using its Hopper HGX 8-GPU High-Performance Computing (HMC) systems to immediately install firmware updates addressing two critical vulnerabilities.

Released on February 28, 2025, the patches target flaws that could allow attackers to execute malicious code, escalate privileges, or cripple enterprise GPU infrastructure through denial-of-service (DoS) attacks.

The advisories highlight risks to AI data centers, cloud platforms, and scientific computing environments relying on these high-end accelerators.

CVE-2024-0114: Systemic Compromise via BMC Exploit (CVSS 8.1)

The highest-risk vulnerability, tracked as CVE-2024-0114 resides in the Hopper HGX Management Controller (HMC)—a critical component overseeing GPU fleet operations.

Attackers with administrative access to a system’s Baseboard Management Controller (BMC) could exploit this flaw to gain unfettered HMC administrator privileges. NVIDIA’s advisory warns that successful exploitation enables:

  • Remote code execution on compromised GPUs
  • Permanent denial of service through hardware state manipulation
  • Sensitive data exfiltration, including AI model weights or training datasets
  • Privilege escalation across multi-tenant cloud deployments

The attack vector requires local network access but poses particular danger in shared infrastructure environments where BMC credentials might be exposed.

NVIDIA emphasizes that organizations using default BMC configurations face heightened risk.

CVE-2024-0141: vBIOS Tampering Enables DoS (CVSS 6.8)

A secondary vulnerability, CVE-2024-0141, affects the GPU vBIOS firmware governing low-level hardware operations.

Malicious actors with tenant-level GPU access could write malicious values to unsupported registers, forcing GPUs into unrecoverable failure states.

While rated medium severity, this flaw threatens cloud service providers by allowing rogue users to destabilize shared GPU resources.

The vBIOS exploit requires no physical access, making it viable in virtualized environments. NVIDIA notes that attacks would bypass traditional virtualization security layers, potentially crashing entire GPU partitions.

Mitigation and Industry Response

NVIDIA has released firmware version 1.6.0 to address both vulnerabilities, with backward compatibility for systems running earlier HMC builds. The company advises:

  1. Immediate installation of updates across all affected Hopper HGX deployments
  2. Hardening BMC configurations to minimize attack surfaces
  3. Auditing access controls for GPU management interfaces

“These patches are non-optional for any organization using Hopper systems in production,” said Priya Balasubramanian, lead security engineer at NVIDIA’s Product Security Incident Response Team (PSIRT).

“The combination of code execution and hardware bricking capabilities creates unacceptable operational risks.”

The disclosure follows increased scrutiny of GPU security as AI workloads expand. Researchers warn that compromised accelerators could enable model theft, training data poisoning, or supply-chain attacks across ML platforms.

With over 80% of AI data centers utilizing NVIDIA GPUs, timely patching remains critical to global infrastructure integrity.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious...

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious...

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...