CVE-2024-0142: CWE-787 Out-of-bounds Write in NVIDIA nvJPEG2000
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
AI Analysis
Technical Summary
CVE-2024-0142 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in NVIDIA's nvJPEG2000 library version 0.8.0. The flaw arises when the library processes a specially crafted JPEG2000 image file, leading to an out-of-bounds write condition. This memory corruption can potentially allow an attacker to overwrite adjacent memory regions, which may result in arbitrary code execution or data tampering. The vulnerability is remotely exploitable over a network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 6.8, indicating a medium severity level. The integrity and availability impacts are high, while confidentiality impact is none. No known exploits have been reported in the wild, and no patches have been published yet. The nvJPEG2000 library is used in NVIDIA’s GPU-accelerated image processing pipelines, often integrated into software handling JPEG2000 images in various industries. Exploiting this vulnerability could allow attackers to execute arbitrary code or modify data, potentially disrupting services or compromising system integrity. Due to the requirement for user interaction, exploitation might occur through social engineering or malicious file delivery. The vulnerability was reserved in December 2023 and published in February 2025, indicating a recent discovery. Organizations using NVIDIA’s nvJPEG2000 library should be vigilant and prepare to apply patches once available.
Potential Impact
The vulnerability poses a significant risk to organizations that utilize NVIDIA's nvJPEG2000 library for processing JPEG2000 images, especially in environments where untrusted image files are handled. Successful exploitation can lead to arbitrary code execution, allowing attackers to run malicious code within the context of the vulnerable application, potentially leading to full system compromise. Data tampering could undermine the integrity of image data or related processing workflows, impacting reliability and trustworthiness of outputs. Availability may also be affected if the exploit causes application crashes or system instability. Given the remote network attack vector and lack of required privileges, attackers could target exposed services or users who open malicious JPEG2000 files. The need for user interaction reduces the likelihood of automated widespread exploitation but does not eliminate targeted attacks, particularly in sectors relying heavily on NVIDIA GPU-accelerated image processing such as media, scientific research, and defense. The absence of patches and known exploits means organizations currently face a window of exposure. The impact extends to confidentiality indirectly if attackers leverage code execution to escalate privileges or move laterally within networks.
Mitigation Recommendations
Until official patches are released by NVIDIA, organizations should implement several practical mitigations: 1) Restrict or block untrusted JPEG2000 files from being processed by systems using the nvJPEG2000 library, especially from external or unknown sources. 2) Employ robust file validation and sandboxing techniques to isolate image processing tasks, limiting the potential damage from exploitation. 3) Monitor network and endpoint logs for unusual activity related to JPEG2000 file handling or nvJPEG2000 library usage. 4) Educate users about the risks of opening untrusted image files and implement policies to reduce user interaction with potentially malicious content. 5) Use application whitelisting and least privilege principles to limit the execution context of vulnerable applications. 6) Prepare for rapid deployment of patches once NVIDIA releases updates by maintaining an inventory of affected systems and software versions. 7) Consider alternative image processing libraries or workflows if immediate risk reduction is necessary and feasible. 8) Employ intrusion detection systems with signatures or heuristics targeting JPEG2000 exploitation attempts when available.
Affected Countries
United States, China, Germany, Japan, South Korea, France, United Kingdom, Canada, India, Taiwan
CVE-2024-0142: CWE-787 Out-of-bounds Write in NVIDIA nvJPEG2000
Description
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
AI-Powered Analysis
Technical Analysis
CVE-2024-0142 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in NVIDIA's nvJPEG2000 library version 0.8.0. The flaw arises when the library processes a specially crafted JPEG2000 image file, leading to an out-of-bounds write condition. This memory corruption can potentially allow an attacker to overwrite adjacent memory regions, which may result in arbitrary code execution or data tampering. The vulnerability is remotely exploitable over a network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 6.8, indicating a medium severity level. The integrity and availability impacts are high, while confidentiality impact is none. No known exploits have been reported in the wild, and no patches have been published yet. The nvJPEG2000 library is used in NVIDIA’s GPU-accelerated image processing pipelines, often integrated into software handling JPEG2000 images in various industries. Exploiting this vulnerability could allow attackers to execute arbitrary code or modify data, potentially disrupting services or compromising system integrity. Due to the requirement for user interaction, exploitation might occur through social engineering or malicious file delivery. The vulnerability was reserved in December 2023 and published in February 2025, indicating a recent discovery. Organizations using NVIDIA’s nvJPEG2000 library should be vigilant and prepare to apply patches once available.
Potential Impact
The vulnerability poses a significant risk to organizations that utilize NVIDIA's nvJPEG2000 library for processing JPEG2000 images, especially in environments where untrusted image files are handled. Successful exploitation can lead to arbitrary code execution, allowing attackers to run malicious code within the context of the vulnerable application, potentially leading to full system compromise. Data tampering could undermine the integrity of image data or related processing workflows, impacting reliability and trustworthiness of outputs. Availability may also be affected if the exploit causes application crashes or system instability. Given the remote network attack vector and lack of required privileges, attackers could target exposed services or users who open malicious JPEG2000 files. The need for user interaction reduces the likelihood of automated widespread exploitation but does not eliminate targeted attacks, particularly in sectors relying heavily on NVIDIA GPU-accelerated image processing such as media, scientific research, and defense. The absence of patches and known exploits means organizations currently face a window of exposure. The impact extends to confidentiality indirectly if attackers leverage code execution to escalate privileges or move laterally within networks.
Mitigation Recommendations
Until official patches are released by NVIDIA, organizations should implement several practical mitigations: 1) Restrict or block untrusted JPEG2000 files from being processed by systems using the nvJPEG2000 library, especially from external or unknown sources. 2) Employ robust file validation and sandboxing techniques to isolate image processing tasks, limiting the potential damage from exploitation. 3) Monitor network and endpoint logs for unusual activity related to JPEG2000 file handling or nvJPEG2000 library usage. 4) Educate users about the risks of opening untrusted image files and implement policies to reduce user interaction with potentially malicious content. 5) Use application whitelisting and least privilege principles to limit the execution context of vulnerable applications. 6) Prepare for rapid deployment of patches once NVIDIA releases updates by maintaining an inventory of affected systems and software versions. 7) Consider alternative image processing libraries or workflows if immediate risk reduction is necessary and feasible. 8) Employ intrusion detection systems with signatures or heuristics targeting JPEG2000 exploitation attempts when available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2023-12-02T00:42:52.660Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ac3
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:48:12 PM
Last updated: 2/26/2026, 11:17:43 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.