Cyber Security News

NVIDIA Patch Multiple GPU Display Driver for Windows & Linux

NVIDIA has issued essential security updates for its GPU Display Driver, addressing multiple vulnerabilities affecting Windows and Linux systems.

Users are urged to download and install these updates promptly via the NVIDIA Driver Downloads page or the NVIDIA Licensing Portal for vGPU software and Cloud Gaming updates. 

The vulnerabilities identified by their CVE IDs pose significant security risks, including potential code execution, denial of service, privilege escalation, information disclosure, and data tampering.

National Cybersecurity Awareness Month Cyber Challenges – Test your Skills Now

NVIDIA GPU Display Driver Vulnerabilities:

Below is a detailed table of the vulnerabilities addressed:

CVE IDDescriptionBase ScoreSeverityImpacts
CVE‑2024‑0126Another out-of-bounds read vulnerability in the Windows user mode layer.8.2HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0117Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0118Similar out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0119Another out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0120Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering
CVE‑2024‑0121Out-of-bounds read vulnerability in Windows user mode layer.7.8HighCode execution, denial of service, privilege escalation, info disclosure, data tampering

NVIDIA vGPU Software Vulnerabilities:

CVE IDDescriptionBase ScoreSeverityImpacts
CVE‑2024‑0127Improper input validation in vGPU Manager for all hypervisors.7.8HighCode execution, privilege escalation, data tampering, denial of service, info disclosure
CVE‑2024‑0128Access to global resources in Virtual GPU Manager by guest OS users.7.1HighPrivilege escalation, information disclosure, and data tampering

These updates are crucial for maintaining system security and protecting sensitive information from potential threats.

NVIDIA recommends all users apply these patches immediately to mitigate risks associated with these vulnerabilities.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo Framework,…

2 hours ago

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution (RCE)…

3 hours ago

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the disclosure…

3 hours ago

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in Zyxel’s…

4 hours ago

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash servers…

6 hours ago

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of threat…

7 hours ago