Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0114: CWE-1244 in NVIDIA NVIDIA Hopper HGX 8-GPU

0
High
VulnerabilityCVE-2024-0114cvecve-2024-0114cwe-1244
Published: Wed Mar 05 2025 (03/05/2025, 01:34:16 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA Hopper HGX 8-GPU

Description

NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:48:27 UTC

Technical Analysis

CVE-2024-0114 is a vulnerability classified under CWE-1244 that affects the NVIDIA Hopper HGX 8-GPU platform's HGX Management Controller (HMC). The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access and gain administrative control over the HMC. The HMC is critical for managing the GPU cluster, and unauthorized control can lead to severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation beyond the initial BMC access, unauthorized information disclosure, and tampering with data or system configurations. This vulnerability affects multiple versions of the HGX software stack, specifically versions HGX-22.10-1-rc57 through HGX-22.10-1-rc67. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector limited to local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality is low, but integrity and availability impacts are high. No public exploits have been reported yet, but the vulnerability is significant given the critical role of the HMC in managing GPU resources in high-performance computing and AI workloads. The vulnerability requires administrative access to the BMC, which is typically restricted but could be compromised through other means, making this a potential lateral movement or privilege escalation vector within a data center environment.

Potential Impact

The potential impact of CVE-2024-0114 is substantial for organizations utilizing NVIDIA Hopper HGX 8-GPU systems, especially in environments relying on high-performance computing, AI training, and data center GPU clusters. Successful exploitation could allow attackers to execute arbitrary code on the HMC, disrupt GPU management services causing denial of service, escalate privileges to gain broader control over the system, and tamper with sensitive data or configurations. This could lead to compromised AI workloads, data corruption, downtime, and potential leakage of proprietary or sensitive information. Given the critical nature of GPU clusters in AI research, cloud services, and enterprise data centers, the vulnerability could affect operational continuity and data integrity. The requirement for administrative BMC access limits the attack surface but also highlights the importance of securing management interfaces. Organizations with inadequate BMC access controls or those that share administrative credentials are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to gain deeper access into infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-0114, organizations should implement strict access controls on the Baseboard Management Controller (BMC), ensuring that only trusted administrators have access and that credentials are strong and regularly rotated. Network segmentation should isolate BMC interfaces from general network access, limiting exposure to potential attackers. Monitoring and logging of BMC and HMC administrative activities should be enhanced to detect suspicious behavior early. Organizations should apply any available patches or firmware updates from NVIDIA as soon as they are released to address this vulnerability. Additionally, employing multi-factor authentication (MFA) for BMC access can reduce the risk of credential compromise. Regular security audits and penetration testing focused on management controllers can help identify weaknesses. If patching is delayed, consider temporarily disabling or restricting HMC management features that are not essential. Finally, ensure that incident response plans include scenarios involving management controller compromise to minimize impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2023-12-02T00:42:25.070Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43885912abc71d61ac0

Added to database: 2/26/2026, 7:51:20 PM

Last enriched: 2/26/2026, 9:48:27 PM

Last updated: 2/26/2026, 11:16:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses