NVIDIA Windows GPU Display Driver (Jun 2023)

high Nessus Plugin ID 177834

Synopsis

The NVIDIA GPU display driver software on the remote Windows host is missing a vendor-supplied patch.

Description

A display driver installed on the remote Windows host is affected by multiple vulnerabilities, as follows:

- NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. (CVE-2022-34671)

- NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity. (CVE-2023-25515)

Note that Nessus has not attempted to exploit these issues but has instead relied only on the driver's self-reported version number.

Solution

Upgrade the NVIDIA graphics driver in accordance with the vendor advisory.

See Also

https://nvidia.custhelp.com/app/answers/detail/a_id/5468

Plugin Details

Severity: High

ID: 177834

File Name: nvidia_win_2023_6.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 6/30/2023

Updated: 3/8/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-34671

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nvidia:gpu_driver

Required KB Items: Settings/ParanoidReport, WMI/DisplayDrivers/NVIDIA

Exploit Ease: No known exploits are available

Patch Publication Date: 6/27/2023

Vulnerability Publication Date: 6/27/2023

Reference Information

CVE: CVE-2022-34671, CVE-2023-25515

IAVA: 2023-A-0323-S