Thursday, January 30, 2025
HomeCVE/vulnerabilityNVIDIA Patch Multiple GPU Display Driver for Windows & Linux

NVIDIA Patch Multiple GPU Display Driver for Windows & Linux

Published on

SIEM as a Service

Follow Us on Google News

NVIDIA has issued essential security updates for its GPU Display Driver, addressing multiple vulnerabilities affecting Windows and Linux systems.

Users are urged to download and install these updates promptly via the NVIDIA Driver Downloads page or the NVIDIA Licensing Portal for vGPU software and Cloud Gaming updates. 

The vulnerabilities identified by their CVE IDs pose significant security risks, including potential code execution, denial of service, privilege escalation, information disclosure, and data tampering.

National Cybersecurity Awareness Month Cyber Challenges – Test your Skills Now

NVIDIA GPU Display Driver Vulnerabilities:

Below is a detailed table of the vulnerabilities addressed:

CVE IDDescriptionBase ScoreSeverityImpacts
CVE‑2024‑0126Another out-of-bounds read vulnerability in the Windows user mode layer.8.2HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0117Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0118Similar out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0119Another out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0120Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0121Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering

NVIDIA vGPU Software Vulnerabilities:

CVE IDDescriptionBase ScoreSeverityImpacts
CVE‑2024‑0127Improper input validation in vGPU Manager for all hypervisors.7.8HighCode execution, privilege escalation, data tampering, denial of service, info disclosure
CVE‑2024‑0128Access to global resources in Virtual GPU Manager by guest OS users.7.1HighPrivilege escalation, information disclosure, and data tampering

These updates are crucial for maintaining system security and protecting sensitive information from potential threats.

NVIDIA recommends all users apply these patches immediately to mitigate risks associated with these vulnerabilities.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two...

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two...

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...