Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-31609 (GCVE-0-2022-31609)
Vulnerability from cvelistv5 – Published: 2022-08-05 20:30 – Updated: 2024-08-03 07:26- CWE-285 - Improper Authorization
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| NVIDIA | NVIDIA Virtual GPU Software and NVIDIA Cloud Gaming |
Affected:
vGPU version 14.x (prior to 14.2), version 13.x (prior to 13.4) and version 11.x (prior 11.9).
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:26:01.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NVIDIA Virtual GPU Software and NVIDIA Cloud Gaming",
"vendor": "NVIDIA",
"versions": [
{
"status": "affected",
"version": "vGPU version 14.x (prior to 14.2), version 13.x (prior to 13.4) and version 11.x (prior 11.9)."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285 Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-05T20:30:19.000Z",
"orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"shortName": "nvidia"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2022-31609",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NVIDIA Virtual GPU Software and NVIDIA Cloud Gaming",
"version": {
"version_data": [
{
"version_value": "vGPU version 14.x (prior to 14.2), version 13.x (prior to 13.4) and version 11.x (prior 11.9)."
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285 Improper Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"assignerShortName": "nvidia",
"cveId": "CVE-2022-31609",
"datePublished": "2022-08-05T20:30:19.000Z",
"dateReserved": "2022-05-24T00:00:00.000Z",
"dateUpdated": "2024-08-03T07:26:01.107Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-31609",
"date": "2026-05-11",
"epss": "0.00043",
"percentile": "0.12977"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndExcluding\": \"11.8\", \"matchCriteriaId\": \"45F338C5-245D-4D10-9B48-B56B7094F167\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0\", \"versionEndExcluding\": \"13.3\", \"matchCriteriaId\": \"98C8F13F-2F8F-4BAE-B971-582084B93D58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CB2F728-3BFD-418D-AC29-A4165D1E7CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3C0C0B2-C4DC-4DB8-BD80-D6082FD1248B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.\"}, {\"lang\": \"es\", \"value\": \"El software NVIDIA vGPU contiene una vulnerabilidad en el Virtual GPU Manager (vGPU plugin), donde permite que la VM invitada asigne recursos para los que el invitado no est\\u00e1 autorizado. Esta vulnerabilidad puede conllevar a una p\\u00e9rdida de integridad y confidencialidad de los datos, una denegaci\\u00f3n de servicio o una divulgaci\\u00f3n de informaci\\u00f3n\"}]",
"id": "CVE-2022-31609",
"lastModified": "2024-11-21T07:04:50.567",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@nvidia.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2022-08-05T21:15:08.813",
"references": "[{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\", \"source\": \"psirt@nvidia.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@nvidia.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt@nvidia.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-31609\",\"sourceIdentifier\":\"psirt@nvidia.com\",\"published\":\"2022-08-05T21:15:08.813\",\"lastModified\":\"2024-11-21T07:04:50.567\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.\"},{\"lang\":\"es\",\"value\":\"El software NVIDIA vGPU contiene una vulnerabilidad en el Virtual GPU Manager (vGPU plugin), donde permite que la VM invitada asigne recursos para los que el invitado no est\u00e1 autorizado. Esta vulnerabilidad puede conllevar a una p\u00e9rdida de integridad y confidencialidad de los datos, una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.8\",\"matchCriteriaId\":\"45F338C5-245D-4D10-9B48-B56B7094F167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.3\",\"matchCriteriaId\":\"98C8F13F-2F8F-4BAE-B971-582084B93D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB2F728-3BFD-418D-AC29-A4165D1E7CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C0C0B2-C4DC-4DB8-BD80-D6082FD1248B\"}]}]}],\"references\":[{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
WID-SEC-W-2022-0894
Vulnerability from csaf_certbund - Published: 2022-08-02 22:00 - Updated: 2023-10-03 22:00Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "NVidia ist ein Hersteller von Grafikkarten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Nvidia GPU Treiber ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0894 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0894.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0894 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0894"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202310-02 vom 2023-10-03",
"url": "https://security.gentoo.org/glsa/202310-02"
},
{
"category": "external",
"summary": "Security Bulletin: NVIDIA GPU Display Driver - August 2022 vom 2022-08-02",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5547-1 vom 2022-08-04",
"url": "https://ubuntu.com/security/notices/USN-5547-1"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-91370 vom 2022-08-14",
"url": "https://support.lenovo.com/us/en/product_security/LEN-91370"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2022-222 vom 2022-09-20",
"url": "https://www.dell.com/support/kbdoc/de-de/000202225/dsa-2022-222-dell-client-platform-security-update-for-nvidia-gpu-display-driver-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Nvidia GPU Treiber und NVIDIA vGPU software: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-10-03T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:32:45.265+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0894",
"initial_release_date": "2022-08-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-08-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-08-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-08-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von LENOVO aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2023-10-03T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Nvidia Treiber GPU Display Driver for Windows",
"product": {
"name": "Nvidia Treiber GPU Display Driver for Windows",
"product_id": "T024153",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows"
}
}
},
{
"category": "product_name",
"name": "Nvidia Treiber GPU Display Driver for Linux",
"product": {
"name": "Nvidia Treiber GPU Display Driver for Linux",
"product_id": "T024154",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux"
}
}
},
{
"category": "product_name",
"name": "Nvidia Treiber vGPU software",
"product": {
"name": "Nvidia Treiber vGPU software",
"product_id": "T024155",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:vgpu_software"
}
}
}
],
"category": "product_name",
"name": "Treiber"
}
],
"category": "vendor",
"name": "Nvidia"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-31606",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31606"
},
{
"cve": "CVE-2022-31607",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31607"
},
{
"cve": "CVE-2022-31608",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31608"
},
{
"cve": "CVE-2022-31609",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31609"
},
{
"cve": "CVE-2022-31610",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31610"
},
{
"cve": "CVE-2022-31612",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31612"
},
{
"cve": "CVE-2022-31613",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31613"
},
{
"cve": "CVE-2022-31614",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31614"
},
{
"cve": "CVE-2022-31615",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31615"
},
{
"cve": "CVE-2022-31616",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31616"
},
{
"cve": "CVE-2022-31617",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31617"
},
{
"cve": "CVE-2022-31618",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31618"
},
{
"cve": "CVE-2022-34665",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-34665"
}
]
}
FKIE_CVE-2022-31609
Vulnerability from fkie_nvd - Published: 2022-08-05 21:15 - Updated: 2024-11-21 07:04| URL | Tags | ||
|---|---|---|---|
| psirt@nvidia.com | https://nvidia.custhelp.com/app/answers/detail/a_id/5383 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://nvidia.custhelp.com/app/answers/detail/a_id/5383 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| nvidia | virtual_gpu | * | |
| nvidia | virtual_gpu | * | |
| nvidia | virtual_gpu | 14.0 | |
| nvidia | virtual_gpu | 14.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45F338C5-245D-4D10-9B48-B56B7094F167",
"versionEndExcluding": "11.8",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C8F13F-2F8F-4BAE-B971-582084B93D58",
"versionEndExcluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB2F728-3BFD-418D-AC29-A4165D1E7CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C0C0B2-C4DC-4DB8-BD80-D6082FD1248B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure."
},
{
"lang": "es",
"value": "El software NVIDIA vGPU contiene una vulnerabilidad en el Virtual GPU Manager (vGPU plugin), donde permite que la VM invitada asigne recursos para los que el invitado no est\u00e1 autorizado. Esta vulnerabilidad puede conllevar a una p\u00e9rdida de integridad y confidencialidad de los datos, una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n"
}
],
"id": "CVE-2022-31609",
"lastModified": "2024-11-21T07:04:50.567",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@nvidia.com",
"type": "Secondary"
}
]
},
"published": "2022-08-05T21:15:08.813",
"references": [
{
"source": "psirt@nvidia.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
],
"sourceIdentifier": "psirt@nvidia.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "psirt@nvidia.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8482-W39M-G3C5
Vulnerability from github – Published: 2022-08-06 00:00 – Updated: 2022-08-06 00:00NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.
{
"affected": [],
"aliases": [
"CVE-2022-31609"
],
"database_specific": {
"cwe_ids": [
"CWE-285",
"CWE-863"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-08-05T21:15:00Z",
"severity": "HIGH"
},
"details": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.",
"id": "GHSA-8482-w39m-g3c5",
"modified": "2022-08-06T00:00:36Z",
"published": "2022-08-06T00:00:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31609"
},
{
"type": "WEB",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
BDU:2022-04822
Vulnerability from fstec - Published: 05.08.2022{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "NVIDIA Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Cloud Gaming Virtual GPU Manager), \u0434\u043e 510.85.03 (vGPU), \u0434\u043e 470.141.05 (vGPU), \u0434\u043e 450.203 (vGPU)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "08.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.08.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-04822",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-31609",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cloud Gaming Virtual GPU Manager, vGPU",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 NVIDIA Virtual GPU Manager \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 NVIDIA Virtual GPU, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0430\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u044f (CWE-285)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 NVIDIA Virtual GPU Manager \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 NVIDIA Virtual GPU \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-285",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
GSD-2022-31609
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-31609",
"description": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.",
"id": "GSD-2022-31609"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-31609"
],
"details": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.",
"id": "GSD-2022-31609",
"modified": "2023-12-13T01:19:18.092037Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2022-31609",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NVIDIA Virtual GPU Software and NVIDIA Cloud Gaming",
"version": {
"version_data": [
{
"version_value": "vGPU version 14.x (prior to 14.2), version 13.x (prior to 13.4) and version 11.x (prior 11.9)."
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285 Improper Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.8",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2022-31609"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-07-24T13:07Z",
"publishedDate": "2022-08-05T21:15Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.