Saturday, May 18, 2024

NVIDIA Security Updates Fixes Critical Vulnerabilities that Allows Hackers Escalate Privileges and Perform DoS Attacks

NVIDIA released security updates that fix vulnerabilities with NVIDIA GeForce Experience. Attackers can exploit this vulnerability to escalate privileges, cause the denial of service attacks and code execution.

This vulnerability can be tracked as CVE‑2019‑5674 and it receives the base score of 8.8 and it affects all the version prior to 3.18.

Attackers exploit the vulnerability when ShadowPlay, NvContainer, or GameStream is enabled with NVIDIA GeForce Experience.

“The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting security or IT professional to evaluate the risk to your specific configuration,” reads the security advisory.

[table id=4 /]

The GeForce Experience is the companion application to your GeForce GTX graphics card. It keeps your drivers up to date, automatically optimizes your game settings, and gives you the easiest way to share your greatest gaming moments with friends.

Users are recommended to download and install the updated version of NVIDIA GeForce Experience from the Downloads page.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Cisco Released Security Updates – Vulnerable Cisco Devices Let Hackers Execute an Arbitrary Code

Apple Released Security Updates for iOS, Safari, tvOS, iTunes & Fixed Several Vulnerabilities

Website

Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles