Plattform
nvidia
Komponente
nvidia-gpu-graphics-driver
CVE-2019-5667 is a security vulnerability affecting the NVIDIA Windows GPU Display Driver. It resides within the kernel-mode layer (nvlddmkm.sys) specifically in the DxgkDdiSetRootPageTable handler. This flaw allows an attacker to potentially trigger code execution, denial of service, or escalate privileges by exploiting a NULL pointer dereference. All versions of the NVIDIA Windows GPU Display Driver are affected, and a fix is pending.
The core of the vulnerability lies in the DxgkDdiSetRootPageTable handler within nvlddmkm.sys. An attacker can craft malicious input that causes the driver to attempt to dereference a NULL pointer. This can lead to several severe consequences. Code execution allows the attacker to run arbitrary code within the kernel, potentially gaining complete control of the system. Denial of service can be achieved by crashing the driver, rendering the GPU unusable. Privilege escalation allows an unprivileged user to gain elevated privileges, bypassing security restrictions. The potential blast radius is significant, as a compromised GPU driver can impact the entire operating system.
CVE-2019-5667 was published on February 27, 2019. The vulnerability's severity is pending evaluation. No public exploits or proof-of-concept code have been publicly disclosed as of this writing. It is not currently listed on KEV or EPSS. Active campaigns exploiting this vulnerability are not known, but the potential for privilege escalation and code execution warrants careful monitoring.
Exploit-Status
EPSS
0.05% (14% Perzentil)
The primary mitigation for CVE-2019-5667 is to update to a patched version of the NVIDIA Windows GPU Display Driver. NVIDIA has not released specific fixed versions as of the publication date, so monitoring NVIDIA's security advisories is crucial. As a temporary workaround, consider implementing strict input validation on any data passed to the DxgkDdiSetRootPageTable function. While not a complete solution, this can reduce the attack surface. WAFs and proxies are unlikely to be effective against this kernel-level vulnerability. After upgrading the driver, confirm the fix by running a memory integrity check and verifying system stability under load.
Actualice el controlador de gráficos NVIDIA a la última versión disponible desde el sitio web del fabricante o a través de Windows Update. Esto solucionará la vulnerabilidad en el controlador del modo kernel.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
It's a vulnerability in the NVIDIA Windows GPU Display Driver that can lead to code execution, denial of service, or privilege escalation due to a NULL pointer dereference.
If you are using any version of the NVIDIA Windows GPU Display Driver, you are potentially affected. Check NVIDIA's website for updated drivers.
Update to the latest patched version of the NVIDIA Windows GPU Display Driver. Monitor NVIDIA's security advisories for release information.
No active campaigns exploiting this vulnerability are currently known, but it's important to apply the patch as soon as possible.
Refer to the NVIDIA security advisory and the National Vulnerability Database (NVD) entry for CVE-2019-5667 for more details.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.