NVIDIA GPU Display Driver Vulnerability Allows Attackers to Take Control of Windows PCs

CVSScvssV3_1: 7.8

NVIDIA GPU display drivers are software that allow Windows PCs to utilize the graphics processing capabilities of NVIDIA graphics cards. A new vulnerability has been discovered in these drivers that could allow attackers to execute code on affected systems with elevated privileges.

The vulnerability, tracked as CVE-2023-31017, has a CVSS score of 7.8 out of 10 indicating its potential impact is high. It involves how the drivers handle reparse points, which are special folders and files that can redirect operations. By manipulating reparse points, an attacker could trick the drivers into writing arbitrary data to protected areas of memory. This could then be exploited to run malicious code or modify important system files.

To carry out an attack, a hacker would need to get a targeted user to open a specially crafted file or visit a malicious website. No user interaction would be required once the initial foothold is achieved. The vulnerability affects all recent versions of the NVIDIA GPU drivers for Windows and could enable a remote attacker to completely take over an unpatched system.

NVIDIA has released an updated driver to address this issue. Windows users with NVIDIA graphics cards should make sure their drivers are up to date to protect themselves. It’s also recommended to only open files and visit websites from trusted sources. Being vigilant about software and driver updates is key to keeping systems secured against vulnerabilities like this.