Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31606: CWE-787 Out-of-bounds Write in NVIDIA NVIDIA Cloud Gaming (guest driver)

0
High
VulnerabilityCVE-2022-31606cvecve-2022-31606cwe-787
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: NVIDIA
Product: NVIDIA Cloud Gaming (guest driver)

Description

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.

AI-Powered Analysis

AILast updated: 06/25/2025, 00:05:42 UTC

Technical Analysis

CVE-2022-31606 is a high-severity vulnerability identified in the NVIDIA GPU Display Driver for Windows, specifically within the kernel mode component nvlddmkm.sys that handles the DxgkDdiEscape interface. This vulnerability is classified as a CWE-787 Out-of-bounds Write, meaning that the driver fails to properly validate input data, allowing an attacker with limited privileges (basic user capabilities) to cause an out-of-bounds memory write in kernel mode. Such an out-of-bounds write can corrupt memory, potentially leading to multiple adverse outcomes including denial of service (system crashes or instability), information disclosure (leaking sensitive data from kernel memory), escalation of privileges (gaining higher-level access rights), or data tampering (modifying critical system or application data). The vulnerability affects all versions of the NVIDIA Cloud Gaming guest driver released prior to the August 2022 update. Exploitation does not require user interaction but does require local access with at least limited privileges. The CVSS 3.1 base score is 7.8, reflecting high severity, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild as of the publication date (November 18, 2022). This vulnerability is particularly relevant for environments using NVIDIA Cloud Gaming technology or NVIDIA GPUs on Windows systems, where the guest driver is deployed. The kernel mode nature of the flaw means successful exploitation could compromise the entire system's security posture.

Potential Impact

For European organizations, the impact of CVE-2022-31606 can be significant, especially in sectors relying on NVIDIA GPUs for cloud gaming, virtualization, or GPU-accelerated workloads on Windows platforms. Potential impacts include system downtime due to denial of service, exposure of sensitive data through information disclosure, and unauthorized privilege escalation leading to broader network compromise. Organizations in gaming, media streaming, cloud service providers, and research institutions using GPU virtualization could be particularly affected. The vulnerability's ability to be exploited by users with basic privileges means insider threats or compromised user accounts could leverage this flaw to escalate privileges or disrupt operations. Given the high confidentiality, integrity, and availability impacts, exploitation could lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed or altered. Additionally, operational disruptions could affect service availability and business continuity. Although no public exploits are known, the presence of this vulnerability in widely deployed NVIDIA drivers necessitates urgent attention to prevent potential targeted attacks or future exploit development.

Mitigation Recommendations

European organizations should prioritize updating NVIDIA GPU Display Drivers to versions released in or after August 2022, which contain the patch for CVE-2022-31606. Since no direct patch links are provided, organizations should obtain updates directly from NVIDIA's official channels to ensure authenticity. Additionally, organizations should implement strict access controls to limit local user privileges, minimizing the number of users with the ability to execute code or commands that interact with the GPU driver. Employing endpoint detection and response (EDR) solutions capable of monitoring kernel mode driver behavior can help detect anomalous activities indicative of exploitation attempts. Network segmentation and isolation of systems running NVIDIA Cloud Gaming or GPU virtualization workloads can reduce lateral movement risks if exploitation occurs. Regular vulnerability scanning and asset inventory should include GPU drivers to ensure timely identification of outdated versions. For environments where immediate patching is not feasible, consider disabling or restricting the use of the affected NVIDIA Cloud Gaming guest driver components where possible. Finally, maintain up-to-date backups and incident response plans tailored to GPU-related threats to ensure rapid recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2022-05-24T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeee3f

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 12:05:42 AM

Last updated: 2/7/2026, 10:09:26 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats