Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0107: CWE-125 Out-of-bounds Read in NVIDIA GPU Display Driver, vGPU Software, Cloud Gaming

0
High
VulnerabilityCVE-2024-0107cvecve-2024-0107cwe-125
Published: Thu Aug 08 2024 (08/08/2024, 16:57:49 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Driver, vGPU Software, Cloud Gaming

Description

NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:12:54 UTC

Technical Analysis

CVE-2024-0107 is an out-of-bounds read vulnerability classified under CWE-125 found in the NVIDIA GPU Display Driver for Windows, including virtual GPU (vGPU) software and cloud gaming platforms. The flaw exists in the user mode layer of the driver, where an unprivileged regular user can trigger an out-of-bounds read condition. This memory access violation can lead to multiple severe consequences: arbitrary code execution, denial of service (system crashes or GPU driver failures), escalation of privileges from a regular user to higher system privileges, unauthorized disclosure of sensitive information, and tampering with data integrity. The vulnerability affects all versions of the NVIDIA GPU Display Driver up to and including the June 2024 release. The CVSS v3.1 score is 7.8, indicating high severity, with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and requiring user interaction (UI:R). The scope is unchanged (S:U), but confidentiality, integrity, and availability impacts are all high (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for environments relying on NVIDIA GPUs, especially in virtualized and cloud gaming contexts where multiple users share GPU resources. The vulnerability could be exploited by malicious local users or malware to compromise system security or disrupt services.

Potential Impact

For European organizations, the impact of CVE-2024-0107 is significant due to the widespread use of NVIDIA GPUs in enterprise desktops, workstations, virtualized environments, and cloud gaming platforms. Confidentiality risks include potential leakage of sensitive data processed or stored in GPU memory. Integrity and availability impacts could disrupt critical business applications relying on GPU acceleration, causing system crashes or denial of service. Privilege escalation could allow attackers to gain administrative control, leading to broader network compromise. Organizations in sectors such as finance, manufacturing, research, and media production that depend heavily on GPU computing are particularly at risk. Additionally, cloud service providers offering GPU-accelerated virtual machines or gaming services in Europe could face multi-tenant security risks if this vulnerability is exploited. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk from insider threats or malware spreading within corporate networks.

Mitigation Recommendations

1. Apply NVIDIA's security patches immediately once they are released for the affected GPU Display Driver versions. 2. Restrict user access to GPU resources by enforcing strict user privilege management and limiting the number of users with local access to systems with vulnerable drivers. 3. Implement application whitelisting and endpoint detection to identify and block suspicious processes attempting to interact with GPU drivers in unusual ways. 4. Monitor system logs and GPU driver events for anomalies that could indicate exploitation attempts, such as unexpected crashes or memory access violations. 5. In virtualized and cloud environments, isolate GPU resources per tenant and enforce strict access controls to prevent lateral movement. 6. Educate users about the risks of interacting with untrusted applications that might trigger the vulnerability. 7. Consider disabling or limiting GPU features not essential for business operations until patches are applied. 8. Collaborate with cloud service providers to ensure they have applied mitigations on their infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2023-12-02T00:42:17.123Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b61ff58c9332ff09421

Added to database: 11/4/2025, 5:44:01 PM

Last enriched: 11/4/2025, 6:12:54 PM

Last updated: 11/5/2025, 10:55:35 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats