NVIDIA DGX-1 Supercomputer Vulnerability Allows Hackers to Take Control

CVSScvssV3_1: 8.2

The firmware that powers NVIDIA’s DGX-1 supercomputer systems contains a vulnerability that could allow attackers to execute arbitrary code and take complete control of affected systems.

The vulnerability, tracked as CVE-2023-0209, exists in the Uncore PEI module of the SBIOS (system BIOS) that is responsible for authenticating and authorizing code execution during the early boot process. However, authentication checks are missing, which means unauthorized code could be executed with the same privileges as the firmware.

An attacker could potentially create a malicious firmware implant that gets executed during boot due to the missing authentication. This would allow them to hijack the system and carry out a wide range of attacks like installing malware, deleting critical system files, accessing sensitive information, or bypassing security protections.

NVIDIA DGX-1 systems are high-performance AI supercomputers used for tasks like training machine learning models. A remote attacker could exploit this vulnerability to disrupt AI workloads or steal confidential data processed by compromised systems.

The best way for organizations using affected NVIDIA DGX-1 systems to protect themselves is to contact NVIDIA about obtaining firmware updates to address this issue as soon as possible. In the meantime, disconnecting compromised systems from external networks can help prevent remote exploitation until patches are installed. Regularly applying security updates is also recommended to stay protected against emerging firmware threats.