CVE-2024-0114: CWE-1244 in NVIDIA NVIDIA Hopper HGX 8-GPU
NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI Analysis
Technical Summary
CVE-2024-0114 is a vulnerability classified under CWE-1244 that affects the NVIDIA Hopper HGX 8-GPU platform's HGX Management Controller (HMC). The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access and gain administrative control over the HMC. The HMC is critical for managing the GPU cluster, and unauthorized control can lead to severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation beyond the initial BMC access, unauthorized information disclosure, and tampering with data or system configurations. This vulnerability affects multiple versions of the HGX software stack, specifically versions HGX-22.10-1-rc57 through HGX-22.10-1-rc67. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector limited to local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality is low, but integrity and availability impacts are high. No public exploits have been reported yet, but the vulnerability is significant given the critical role of the HMC in managing GPU resources in high-performance computing and AI workloads. The vulnerability requires administrative access to the BMC, which is typically restricted but could be compromised through other means, making this a potential lateral movement or privilege escalation vector within a data center environment.
Potential Impact
The potential impact of CVE-2024-0114 is substantial for organizations utilizing NVIDIA Hopper HGX 8-GPU systems, especially in environments relying on high-performance computing, AI training, and data center GPU clusters. Successful exploitation could allow attackers to execute arbitrary code on the HMC, disrupt GPU management services causing denial of service, escalate privileges to gain broader control over the system, and tamper with sensitive data or configurations. This could lead to compromised AI workloads, data corruption, downtime, and potential leakage of proprietary or sensitive information. Given the critical nature of GPU clusters in AI research, cloud services, and enterprise data centers, the vulnerability could affect operational continuity and data integrity. The requirement for administrative BMC access limits the attack surface but also highlights the importance of securing management interfaces. Organizations with inadequate BMC access controls or those that share administrative credentials are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to gain deeper access into infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-0114, organizations should implement strict access controls on the Baseboard Management Controller (BMC), ensuring that only trusted administrators have access and that credentials are strong and regularly rotated. Network segmentation should isolate BMC interfaces from general network access, limiting exposure to potential attackers. Monitoring and logging of BMC and HMC administrative activities should be enhanced to detect suspicious behavior early. Organizations should apply any available patches or firmware updates from NVIDIA as soon as they are released to address this vulnerability. Additionally, employing multi-factor authentication (MFA) for BMC access can reduce the risk of credential compromise. Regular security audits and penetration testing focused on management controllers can help identify weaknesses. If patching is delayed, consider temporarily disabling or restricting HMC management features that are not essential. Finally, ensure that incident response plans include scenarios involving management controller compromise to minimize impact.
Affected Countries
United States, China, Germany, Japan, South Korea, United Kingdom, France, Canada, India, Singapore
CVE-2024-0114: CWE-1244 in NVIDIA NVIDIA Hopper HGX 8-GPU
Description
NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI-Powered Analysis
Technical Analysis
CVE-2024-0114 is a vulnerability classified under CWE-1244 that affects the NVIDIA Hopper HGX 8-GPU platform's HGX Management Controller (HMC). The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access and gain administrative control over the HMC. The HMC is critical for managing the GPU cluster, and unauthorized control can lead to severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation beyond the initial BMC access, unauthorized information disclosure, and tampering with data or system configurations. This vulnerability affects multiple versions of the HGX software stack, specifically versions HGX-22.10-1-rc57 through HGX-22.10-1-rc67. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector limited to local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality is low, but integrity and availability impacts are high. No public exploits have been reported yet, but the vulnerability is significant given the critical role of the HMC in managing GPU resources in high-performance computing and AI workloads. The vulnerability requires administrative access to the BMC, which is typically restricted but could be compromised through other means, making this a potential lateral movement or privilege escalation vector within a data center environment.
Potential Impact
The potential impact of CVE-2024-0114 is substantial for organizations utilizing NVIDIA Hopper HGX 8-GPU systems, especially in environments relying on high-performance computing, AI training, and data center GPU clusters. Successful exploitation could allow attackers to execute arbitrary code on the HMC, disrupt GPU management services causing denial of service, escalate privileges to gain broader control over the system, and tamper with sensitive data or configurations. This could lead to compromised AI workloads, data corruption, downtime, and potential leakage of proprietary or sensitive information. Given the critical nature of GPU clusters in AI research, cloud services, and enterprise data centers, the vulnerability could affect operational continuity and data integrity. The requirement for administrative BMC access limits the attack surface but also highlights the importance of securing management interfaces. Organizations with inadequate BMC access controls or those that share administrative credentials are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to gain deeper access into infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-0114, organizations should implement strict access controls on the Baseboard Management Controller (BMC), ensuring that only trusted administrators have access and that credentials are strong and regularly rotated. Network segmentation should isolate BMC interfaces from general network access, limiting exposure to potential attackers. Monitoring and logging of BMC and HMC administrative activities should be enhanced to detect suspicious behavior early. Organizations should apply any available patches or firmware updates from NVIDIA as soon as they are released to address this vulnerability. Additionally, employing multi-factor authentication (MFA) for BMC access can reduce the risk of credential compromise. Regular security audits and penetration testing focused on management controllers can help identify weaknesses. If patching is delayed, consider temporarily disabling or restricting HMC management features that are not essential. Finally, ensure that incident response plans include scenarios involving management controller compromise to minimize impact.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2023-12-02T00:42:25.070Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ac0
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:48:27 PM
Last updated: 2/26/2026, 11:16:26 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.