CVE-2024-0143: CWE-787 Out-of-bounds Write in NVIDIA nvJPEG2000
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
AI Analysis
Technical Summary
CVE-2024-0143 identifies a security flaw in NVIDIA's nvJPEG2000 library version 0.8.0, specifically an out-of-bounds write vulnerability categorized under CWE-787. This vulnerability arises when the library processes a maliciously crafted JPEG2000 image file, leading to memory corruption through writing outside allocated bounds. Such memory corruption can be leveraged by attackers to alter data integrity or execute arbitrary code within the context of the affected application. The vulnerability has a CVSS 3.1 base score of 6.8, indicating medium severity. The attack vector is network-based (AV:N), but the attack complexity is high (AC:H), meaning exploitation requires specific conditions or expertise. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as opening or processing a malicious JPEG2000 file. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. The impact affects integrity and availability (I:H, A:H) but not confidentiality. Currently, no public exploits or patches are available, and the vulnerability was published in February 2025. The nvJPEG2000 library is used in NVIDIA's GPU-accelerated image decoding pipelines, often integrated into broader software frameworks and applications that handle JPEG2000 images, which are common in medical imaging, satellite imagery, and professional graphics. This vulnerability could be exploited by attackers to compromise systems that process untrusted JPEG2000 files, potentially leading to code execution or data tampering.
Potential Impact
The vulnerability poses a risk of arbitrary code execution and data tampering, which can compromise the integrity and availability of affected systems. Organizations relying on NVIDIA's nvJPEG2000 library for image decoding, especially those processing untrusted JPEG2000 files from external sources, face potential exploitation risks. Successful exploitation could allow attackers to execute malicious code, leading to system compromise, data corruption, or denial of service. This is particularly critical for industries like healthcare, geospatial analysis, and media production, where JPEG2000 images are prevalent. Although the attack complexity is high and user interaction is required, the widespread use of NVIDIA GPUs and associated software stacks means many systems could be exposed. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a significant concern until patches are released and applied.
Mitigation Recommendations
1. Monitor NVIDIA's official channels for security patches addressing CVE-2024-0143 and apply them promptly once available. 2. Implement strict input validation and sanitization to prevent processing of untrusted or suspicious JPEG2000 files. 3. Employ application-level sandboxing or containerization to isolate image processing components, limiting potential damage from exploitation. 4. Use runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to hinder exploitation attempts. 5. Restrict user permissions and avoid running image processing applications with elevated privileges. 6. Conduct regular security audits and fuzz testing on image processing workflows to detect similar vulnerabilities proactively. 7. Educate users about the risks of opening untrusted image files and enforce policies to minimize user interaction with potentially malicious content. 8. Monitor network traffic and logs for anomalous activities related to JPEG2000 file handling.
Affected Countries
United States, China, Germany, Japan, South Korea, France, United Kingdom, Canada, India, Taiwan
CVE-2024-0143: CWE-787 Out-of-bounds Write in NVIDIA nvJPEG2000
Description
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
AI-Powered Analysis
Technical Analysis
CVE-2024-0143 identifies a security flaw in NVIDIA's nvJPEG2000 library version 0.8.0, specifically an out-of-bounds write vulnerability categorized under CWE-787. This vulnerability arises when the library processes a maliciously crafted JPEG2000 image file, leading to memory corruption through writing outside allocated bounds. Such memory corruption can be leveraged by attackers to alter data integrity or execute arbitrary code within the context of the affected application. The vulnerability has a CVSS 3.1 base score of 6.8, indicating medium severity. The attack vector is network-based (AV:N), but the attack complexity is high (AC:H), meaning exploitation requires specific conditions or expertise. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as opening or processing a malicious JPEG2000 file. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. The impact affects integrity and availability (I:H, A:H) but not confidentiality. Currently, no public exploits or patches are available, and the vulnerability was published in February 2025. The nvJPEG2000 library is used in NVIDIA's GPU-accelerated image decoding pipelines, often integrated into broader software frameworks and applications that handle JPEG2000 images, which are common in medical imaging, satellite imagery, and professional graphics. This vulnerability could be exploited by attackers to compromise systems that process untrusted JPEG2000 files, potentially leading to code execution or data tampering.
Potential Impact
The vulnerability poses a risk of arbitrary code execution and data tampering, which can compromise the integrity and availability of affected systems. Organizations relying on NVIDIA's nvJPEG2000 library for image decoding, especially those processing untrusted JPEG2000 files from external sources, face potential exploitation risks. Successful exploitation could allow attackers to execute malicious code, leading to system compromise, data corruption, or denial of service. This is particularly critical for industries like healthcare, geospatial analysis, and media production, where JPEG2000 images are prevalent. Although the attack complexity is high and user interaction is required, the widespread use of NVIDIA GPUs and associated software stacks means many systems could be exposed. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a significant concern until patches are released and applied.
Mitigation Recommendations
1. Monitor NVIDIA's official channels for security patches addressing CVE-2024-0143 and apply them promptly once available. 2. Implement strict input validation and sanitization to prevent processing of untrusted or suspicious JPEG2000 files. 3. Employ application-level sandboxing or containerization to isolate image processing components, limiting potential damage from exploitation. 4. Use runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to hinder exploitation attempts. 5. Restrict user permissions and avoid running image processing applications with elevated privileges. 6. Conduct regular security audits and fuzz testing on image processing workflows to detect similar vulnerabilities proactively. 7. Educate users about the risks of opening untrusted image files and enforce policies to minimize user interaction with potentially malicious content. 8. Monitor network traffic and logs for anomalous activities related to JPEG2000 file handling.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2023-12-02T00:42:53.771Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ac7
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:47:51 PM
Last updated: 2/26/2026, 11:18:50 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.