CVE-2024-0144: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in NVIDIA nvJPEG2000
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering.
AI Analysis
Technical Summary
CVE-2024-0144 identifies a classic buffer overflow vulnerability (CWE-120) in NVIDIA's nvJPEG2000 library version 0.8.0. The vulnerability occurs due to a lack of proper input size validation during buffer copy operations when processing JPEG2000 image files. An attacker can craft a malicious JPEG2000 file that triggers this buffer overflow, potentially overwriting adjacent memory. This can lead to data tampering, compromising the integrity of the processed data, and may also cause denial of service by crashing the application or system component using the library. The vulnerability is remotely exploitable over the network (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), but does require user interaction (UI:R), such as opening or processing the malicious file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 6.8, indicating medium severity, with impacts on integrity and availability but no confidentiality loss. Currently, no public exploits or patches are available, and the vulnerability was reserved in December 2023 and published in February 2025. The nvJPEG2000 library is used in NVIDIA's software stack for JPEG2000 image decoding, which is relevant in graphics processing, AI workloads, and potentially other multimedia applications.
Potential Impact
The vulnerability poses a significant risk to organizations relying on NVIDIA's nvJPEG2000 library for JPEG2000 image processing. Successful exploitation can lead to data tampering, undermining the integrity of image data or any dependent processing workflows. Additionally, the buffer overflow can cause application or system crashes, impacting availability and potentially leading to denial of service conditions. This could disrupt services in environments where image processing is critical, such as AI model training, medical imaging, or multimedia content delivery. Since exploitation requires user interaction, phishing or social engineering could be vectors to deliver malicious JPEG2000 files. The lack of privilege requirements and network attack vector increases the exposure, especially in environments where untrusted image files are processed automatically or by end users. Although no confidentiality impact is noted, the integrity and availability impacts can have downstream effects on business operations, data accuracy, and service reliability.
Mitigation Recommendations
1. Monitor NVIDIA's official channels for patches addressing CVE-2024-0144 and apply updates promptly once available. 2. Until patches are released, implement strict input validation and sanitization for JPEG2000 files before processing with nvJPEG2000. 3. Employ sandboxing or containerization techniques to isolate the image processing components, limiting the impact of potential exploitation. 4. Restrict the acceptance of JPEG2000 files from untrusted or unauthenticated sources, especially in automated workflows. 5. Educate users about the risks of opening untrusted image files and implement security awareness training to reduce the likelihood of user interaction exploitation. 6. Use runtime application self-protection (RASP) or intrusion detection systems to monitor for anomalous behavior during image processing. 7. Review and harden network controls to limit exposure of services that process JPEG2000 images to trusted networks only. 8. Conduct code audits and fuzz testing on image processing components to identify and remediate similar vulnerabilities proactively.
Affected Countries
United States, China, South Korea, Japan, Germany, Taiwan, France, United Kingdom, Canada, India
CVE-2024-0144: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in NVIDIA nvJPEG2000
Description
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering.
AI-Powered Analysis
Technical Analysis
CVE-2024-0144 identifies a classic buffer overflow vulnerability (CWE-120) in NVIDIA's nvJPEG2000 library version 0.8.0. The vulnerability occurs due to a lack of proper input size validation during buffer copy operations when processing JPEG2000 image files. An attacker can craft a malicious JPEG2000 file that triggers this buffer overflow, potentially overwriting adjacent memory. This can lead to data tampering, compromising the integrity of the processed data, and may also cause denial of service by crashing the application or system component using the library. The vulnerability is remotely exploitable over the network (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), but does require user interaction (UI:R), such as opening or processing the malicious file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 6.8, indicating medium severity, with impacts on integrity and availability but no confidentiality loss. Currently, no public exploits or patches are available, and the vulnerability was reserved in December 2023 and published in February 2025. The nvJPEG2000 library is used in NVIDIA's software stack for JPEG2000 image decoding, which is relevant in graphics processing, AI workloads, and potentially other multimedia applications.
Potential Impact
The vulnerability poses a significant risk to organizations relying on NVIDIA's nvJPEG2000 library for JPEG2000 image processing. Successful exploitation can lead to data tampering, undermining the integrity of image data or any dependent processing workflows. Additionally, the buffer overflow can cause application or system crashes, impacting availability and potentially leading to denial of service conditions. This could disrupt services in environments where image processing is critical, such as AI model training, medical imaging, or multimedia content delivery. Since exploitation requires user interaction, phishing or social engineering could be vectors to deliver malicious JPEG2000 files. The lack of privilege requirements and network attack vector increases the exposure, especially in environments where untrusted image files are processed automatically or by end users. Although no confidentiality impact is noted, the integrity and availability impacts can have downstream effects on business operations, data accuracy, and service reliability.
Mitigation Recommendations
1. Monitor NVIDIA's official channels for patches addressing CVE-2024-0144 and apply updates promptly once available. 2. Until patches are released, implement strict input validation and sanitization for JPEG2000 files before processing with nvJPEG2000. 3. Employ sandboxing or containerization techniques to isolate the image processing components, limiting the impact of potential exploitation. 4. Restrict the acceptance of JPEG2000 files from untrusted or unauthenticated sources, especially in automated workflows. 5. Educate users about the risks of opening untrusted image files and implement security awareness training to reduce the likelihood of user interaction exploitation. 6. Use runtime application self-protection (RASP) or intrusion detection systems to monitor for anomalous behavior during image processing. 7. Review and harden network controls to limit exposure of services that process JPEG2000 images to trusted networks only. 8. Conduct code audits and fuzz testing on image processing components to identify and remediate similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2023-12-02T00:42:54.857Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61acb
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:47:37 PM
Last updated: 2/26/2026, 11:12:32 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.