{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0132","assignerOrgId":"9576f279-3576-44b5-a4af-b9a8644b2de6","state":"PUBLISHED","assignerShortName":"nvidia","dateReserved":"2023-12-02T00:42:43.107Z","datePublished":"2024-09-26T05:18:33.211Z","dateUpdated":"2024-09-27T03:55:16.649Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Container Toolkit","vendor":"NVIDIA","versions":[{"status":"affected","version":"All versions up to and including v1.16.1"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"GPU Operator","vendor":"NVIDIA","versions":[{"status":"affected","version":"All versions up to and including 24.6.1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</span>"}],"value":"NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."}],"impacts":[{"descriptions":[{"lang":"en","value":"Code execution, denial of service, escalation of privileges, information disclosure, data tampering"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-367","description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9576f279-3576-44b5-a4af-b9a8644b2de6","shortName":"nvidia","dateUpdated":"2024-09-26T05:18:33.211Z"},"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5582"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"nvidia","product":"container_toolkit","cpes":["cpe:2.3:a:nvidia:container_toolkit:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"1.16.1","versionType":"custom"}]},{"vendor":"nvidia","product":"gpu_operator","cpes":["cpe:2.3:a:nvidia:gpu_operator:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"24.6.1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-0132"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-27T03:55:16.649Z"}}]}}