• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

11 High Severity Vulnerabilities found in Nvidia Software

January 12, 2021 By Trevor Collins

Nvidia released updates to its users after security researchers and the Nvidias Product Security Team found 16 vulnerabilities in the Nvidia driver and software packages. One of the vulnerabilities found in the driver package allows for an escalation of privileges and could allow full control of the system. Drivers tend to have administrative privileges and so this creates a serious danger when vulnerabilities are found.

CVE-2021-1051, the most egregious of these vulnerabilities, has a CVE base score of 8.4, giving it a high severity. Based on information provided, you still need access to the device to run the exploit but that doesn’t require a complex set-up.

We haven’t seen the finer details of the vulnerabilities but as researchers review the update, we expect some exploits to become public when researchers review the changes like they have done in the past. Five of the six driver vulnerabilities found come from issues with handling the DxgkDdiEscape callback. Looking at the DxgkDdiEscape callback we found Direct-X makes this callback to the display driver, in this case the Nvidia driver.

A malicious PowerShell script, mistakenly downloaded by the user, could give the hacker access to the victim’s computer followed by the CVE-2021-1051 driver exploit to create a denial of service attack or gain administrative privileges. We would expect ransomware or a remote access trojan used to extort money from the victim.

Nivida patched this on Monday and released a Security Bulletin. We know graphics card updates can break some games, but we have yet to hear of any issues with this update. If you have a vulnerable Nvidia graphics card, ensure that you have updated your driver and software so you don’t fallow victim this attack.

Share This:

Related

Filed Under: Editorial Articles

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
  • TikTok is Banned, Kind Of
  • How Not to Update Software

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • How Not to Update Software
  • Naming APTs
  • TikTok is Banned, Kind Of
  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use