Skip to main content

CVE-2023-31030: CWE-121 in nvidia DGX A100

Critical
VulnerabilityCVE-2023-31030cvecve-2023-31030cwe-121
Published: Fri Jan 12 2024 (01/12/2024, 18:31:34 UTC)
Source: CVE Database V5
Vendor/Project: nvidia
Product: DGX A100

Description

NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 07/05/2025, 23:27:58 UTC

Technical Analysis

CVE-2023-31030 is a critical vulnerability identified in the Baseboard Management Controller (BMC) of the NVIDIA DGX A100 system, specifically within the host Kernel-based Virtual Machine (KVM) daemon. The vulnerability is classified as a stack-based buffer overflow (CWE-121), which occurs when an unauthenticated attacker sends a specially crafted network packet to the BMC. This overflow can corrupt the stack memory, potentially allowing the attacker to execute arbitrary code, cause denial of service (DoS), disclose sensitive information, or tamper with data. The vulnerability affects all BMC firmware versions prior to 00.22.05. The CVSS v3.1 score of 9.3 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. The vector indicates that the attack requires local network access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), with scope changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable one. Although no known exploits are reported in the wild yet, the potential for exploitation is significant given the severity and the nature of the flaw. The DGX A100 is a high-performance AI and HPC platform widely used in research, data centers, and enterprise environments, making this vulnerability particularly sensitive.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those relying on NVIDIA DGX A100 systems for AI research, machine learning workloads, or high-performance computing tasks. Successful exploitation could lead to full compromise of the BMC, allowing attackers to execute arbitrary code with high privileges, disrupt system availability through DoS, or exfiltrate sensitive data processed or stored on these systems. This could result in intellectual property theft, operational downtime, and damage to organizational reputation. Given the critical role of DGX A100 systems in sectors such as academia, finance, healthcare, and government research institutions across Europe, the vulnerability poses a significant risk to data confidentiality and system integrity. Moreover, the ability to tamper with data could undermine the trustworthiness of AI models and research outputs. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating the BMC firmware on all NVIDIA DGX A100 systems to version 00.22.05 or later as soon as the patch becomes available. Until the patch is applied, organizations should restrict network access to the BMC interface by implementing strict network segmentation and firewall rules that limit access to trusted management networks only. Monitoring network traffic for anomalous packets targeting the BMC KVM daemon can help detect potential exploitation attempts. Additionally, disabling unnecessary network services on the BMC and enforcing strong access controls can reduce the attack surface. Organizations should also conduct thorough audits of their DGX A100 deployments to identify any signs of compromise and ensure that incident response plans include scenarios involving BMC exploitation. Collaborating with NVIDIA support for guidance and updates is recommended to stay informed about any new developments or exploit disclosures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2023-04-22T02:38:33.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683ffd67182aa0cae2a3882d

Added to database: 6/4/2025, 8:01:43 AM

Last enriched: 7/5/2025, 11:27:58 PM

Last updated: 8/1/2025, 9:44:56 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats