Security
Headlines
HeadlinesLatestCVEs

Headline

Nvidia Patches High-Severity Flaws in GPU Drivers

Nvidia’s latest GPUs are a hot commodity for AI, but security vulnerabilities could expose them to attacks from hackers.

DARKReading
#vulnerability#ios#mac#windows#google#linux#intel#amd#bios#auth

Source: Vasyl Yakobchuk via Alamy Stock Photo

Nvidia has issued 10 security alerts detailing vulnerabilities in the company’s GPU drivers and virtualization software. The vulnerabilities, if successfully exploited, could allow attackers to steal or tamper with data, execute arbitrary code, or take control of programs, the company said. Considering Nvidia’s growing prominence in artificial intelligence (AI) data centers, these attacks could cause significant damage.

Nvidia issued security patches addressing vulnerabilities in Nvidia’s display drivers, which power GPU visuals on computers. The company also patched the drivers and software for the vGPU virtualization software stack, which is used in data centers and cloud services to serve up virtual desktops and applications. Five security vulnerabilities had “high” severity ratings, with the remaining rated “medium.”

Nvidia urged companies to patch drivers for Linux and Windows PCs and servers affected by the vulnerabilities.

“Applying Nvidia’s patches is crucial to prevent exploits, protect sensitive information, maintain system integrity, and ensure service availability,” said Callie Guenther, senior manager, cyber threat research, at Critical Start, in a prepared research note.

Impact on AI

Nvidia’s latest GPUs are increasingly being used to power AI workloads and data centers. The popularity of Nvidia’s chips in AI make them an attractive target for hackers, says Kevin Krewell, a chip analyst at Tirias Research. AI data and models — especially the ones that are not open-sourced — are valuable and could be a target of GPU hacks, he says.

“With Nvidia chips going into more data centers and the rush to deploy new AI stacks, there’s a new opportunity for vulnerabilities to be introduced,” Krewell says.

Nvidia’s 7-year-old Tesla GPUs, which are used in the Summit supercomputer (the ninth fastest supercomputer in the world), are among the affected products. Google also offers Tesla-based T4 instances to researchers developing AI applications for free via Google Colab. System administrators should pay close attention to patching these older GPUs, which are often ignored and are easy targets for hackers to break into server installations.

“Unpatched systems are definitely the easier way to break in. The issue is whether the Tesla chips have an inherent security vulnerability,” Krewell says.

Adds John Bambanek, president at security consulting firm Bambenek Consulting: “Hardware always lives longer than manufacturers want it to, and the older you get, the more likely the operating system doesn’t centralize the patch management on them.”

Chips Need Timely Patches

Chip makers have to be proactive in patching hardware and software vulnerabilities. Last month researchers published a paper demonstrating theft of data left by inactive processes on field-programmable gate arrays (FPGAs). FPGAs are used for applications that include machine learning in servers, PCs, Internet of Things, and telecom edge devices.

Nvidia had a 98% data-center GPU market share in 2023, according to research firm TechInsights. AMD plans to issue an updated driver to take care of data leakage issues in its MI300A and MI300X GPUs, which compete with Nvidia GPUs. Intel also patched a vulnerability in its AI software stack last month.

“AMD and Intel often produce regular reports on vulnerabilities that have been discovered, which can often be corrected by BIOS patches,” Krewell says. “Tesla GPUs could be patched with new drivers.”

About the Author(s)

Agam Shah has covered enterprise IT for more than a decade. Outside of machine learning, hardware, and chips, he’s also interested in martial arts and Russia.

DARKReading: Latest News

Faux ChatGPT, Claude API Packages Deliver JarkaStealer