2021-1098 | NVIDIA Virtual GPU Manager vGPU Privilege Escalation
CVSS Meta Temp Score
CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. |
Current Exploit Price (≈)
Our analysts are monitoring exploit markets and are in contact with vulnerability brokers. The range indicates the observed or calculated exploit price to be seen on exploit markets. A good indicator to understand the monetary effort required for and the popularity of an attack. |
CTI Interest Score
Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. A high score indicates an elevated risk to be targeted for this vulnerability. |
---|---|---|
8.4 | $0-$5k | 0.14 |
A vulnerability has been found in NVIDIA Virtual GPU Manager up to 8.7/11.4/12.2 and classified as critical. Affected by this vulnerability is an unknown code block of the component vGPU. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn’t release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
The weakness was published 07/21/2021. It is possible to read the advisory at nvidia.custhelp.com. This vulnerability is known as CVE-2021-1098 since 11/12/2020. The exploitation appears to be easy. The attack can be launched remotely. The requirement for exploitation is a single authentication. The technical details are unknown and an exploit is not publicly available.
Upgrading to version 8.8, 11.5 or 12.3 eliminates this vulnerability.
Vendor
Name
VulDB Meta Base Score: 8.8
VulDB Meta Temp Score: 8.4
VulDB Base Score: 8.8
VulDB Temp Score: 8.4
VulDB Vector: 🔒
VulDB Reliability: 🔍
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Unknown
CWE: Unknown
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: Virtual GPU Manager 8.8/11.5/12.3
11/12/2020 CVE assigned
07/21/2021 Advisory disclosed
07/21/2021 VulDB entry created
07/26/2021 VulDB last updateVendor: https://www.nvidia.com/
Advisory: nvidia.custhelp.com
Status: Confirmed
Confirmation: 🔒
CVE: CVE-2021-1098 (🔒)
Created: 07/21/2021 11:32
Updated: 07/26/2021 00:25
Changes: (1) source_cve_cna
Complete: 🔍
Comments
Enable the mail alert feature now!