Go to listing page

NVIDIA patches critical vulnerability that could allow attackers to perform DoS attacks

NVIDIA patches critical vulnerability that could allow attackers to perform DoS attacks
  • NVIDIA Geforce Experience software contains a vulnerability that could allow attackers to escalate privileges, conduct code execution, and perform Denial-of-Service (DoS) attacks.
  • NVIDIA has released a security update to fix this vulnerability in the 3.18 version.

What is the issue - NVIDIA Geforce Experience software contains a vulnerability when ShadowPlay, NvContainer, or GameStream is enabled.

Why it matters - This vulnerability could allow attackers to escalate privileges, conduct code execution, and perform Denial-of-Service (DoS) attacks.

Worth noting

  • This vulnerability tracked CVE‑2019‑5674 was reported by David Yesland, a security researcher from Rhino Security Labs.
  • This vulnerability impacts all NVIDIA Geforce Experience versions prior to 3.18.
  • This vulnerability has a high severity rating and an 8.8 base score from NVIDIA.

“The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration,” NVIDIA stated.

Patch available

When opening a file, the NVIDIA Geforce Experience software does not check for hard links thereby allowing attackers to escalate privileges, perform code execution and DoS attacks.

NVIDIA has released a security update to fix this vulnerability in the 3.18 version. NVIDIA users are requested to update to the latest patched version 3.18 in order to stay protected from DoS attacks.

Cyware Publisher

Publisher

Cyware