NVIDIA GPU Display Driver Vulnerabilities | CVE-2022-31610 | CVE-2022-31617 | CVE-2022-31606
Nvidia Fixes 11 GPU Display Driver Vulnerabilities. Find all vulnerable devices on your network with Lansweeper ► https://www.lansweeper.com/vulnerability/nvidia-fixes-11-gpu-display-driver-vulnerabilities/?utm_campaign=Nvidia_Vul_Aug22&utm_medium=organic_social&utm_source=youtube
NVIDIA released a new security bulletin announcing a software security update for NVIDIA GPU Display Driver. The update addresses 11 vulnerabilities with a CVSS base score between 7.8 and 5.5. These affect Geforce, RTX, Quadro, and Tesla graphics cards and may lead to denial of service, information disclosure, escalation of privileges, code execution, or data tampering.
Get the Lansweeper Nvidia network report here ► https://www.lansweeper.com/report/nvidia-gpu-display-driver-vulnerability-august-2022/?utm_campaign=Nvidia_Vul_Aug22&utm_medium=organic_social&utm_source=youtube
The 5 most severe vulnerabilities addressed all have a CVSS base score of 7.8. Two of these concern a vulnerability in the kernel mode layer (nvlddmkm.sys) in the NVIDIA GPU Display Driver for Windows, where a local user with basic capabilities can cause an out-of-bounds write (CVE-2022-31610) or read (CVE-2022-31617) respectively. This may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
Another severe vulnerability (CVE-2022-31606) is also found in the NVIDIA GPU Display Driver for Windows, this time in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape. Here a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode. This could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
NVIDIA's security bulletin contains a list of all display driver versions and the new driver versions that contain a fix. We've used this information to create a special Lansweeper report that will provide a list of all devices in your environment that are affected by the vulnerabilities. This way you have an actionable list of devices that require a display driver update.
Start your free trial today ► https://www.lansweeper.com/download
Lansweeper enables you to manages your entire IT network, saving an incredible amount of time by automating key tasks. It features best in class fully automatic asset scanning and network inventory software, to keep you on top of your IT-environment.
Recommended by sysadmins all over the world, download your Lansweeper free trial today and start managing your IT assets the right way.
Useful Links
Website ► https://www.lansweeper.com/
Knowledgebase ► https://www.lansweeper.com/kb/
Forum ► https://www.lansweeper.com/forum/
Blog ► https://www.lansweeper.com/blog/
Let’s Connect
Facebook ► https://www.facebook.com/lansweeper.network.inventory
Twitter ► https://twitter.com/lansweeper
Linkedin ► https://www.linkedin.com/company/lansweeper-bvba/
Contact ► Sales@lansweeper.com
Видео NVIDIA GPU Display Driver Vulnerabilities | CVE-2022-31610 | CVE-2022-31617 | CVE-2022-31606 канала Lansweeper
NVIDIA released a new security bulletin announcing a software security update for NVIDIA GPU Display Driver. The update addresses 11 vulnerabilities with a CVSS base score between 7.8 and 5.5. These affect Geforce, RTX, Quadro, and Tesla graphics cards and may lead to denial of service, information disclosure, escalation of privileges, code execution, or data tampering.
Get the Lansweeper Nvidia network report here ► https://www.lansweeper.com/report/nvidia-gpu-display-driver-vulnerability-august-2022/?utm_campaign=Nvidia_Vul_Aug22&utm_medium=organic_social&utm_source=youtube
The 5 most severe vulnerabilities addressed all have a CVSS base score of 7.8. Two of these concern a vulnerability in the kernel mode layer (nvlddmkm.sys) in the NVIDIA GPU Display Driver for Windows, where a local user with basic capabilities can cause an out-of-bounds write (CVE-2022-31610) or read (CVE-2022-31617) respectively. This may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
Another severe vulnerability (CVE-2022-31606) is also found in the NVIDIA GPU Display Driver for Windows, this time in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape. Here a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode. This could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
NVIDIA's security bulletin contains a list of all display driver versions and the new driver versions that contain a fix. We've used this information to create a special Lansweeper report that will provide a list of all devices in your environment that are affected by the vulnerabilities. This way you have an actionable list of devices that require a display driver update.
Start your free trial today ► https://www.lansweeper.com/download
Lansweeper enables you to manages your entire IT network, saving an incredible amount of time by automating key tasks. It features best in class fully automatic asset scanning and network inventory software, to keep you on top of your IT-environment.
Recommended by sysadmins all over the world, download your Lansweeper free trial today and start managing your IT assets the right way.
Useful Links
Website ► https://www.lansweeper.com/
Knowledgebase ► https://www.lansweeper.com/kb/
Forum ► https://www.lansweeper.com/forum/
Blog ► https://www.lansweeper.com/blog/
Let’s Connect
Facebook ► https://www.facebook.com/lansweeper.network.inventory
Twitter ► https://twitter.com/lansweeper
Linkedin ► https://www.linkedin.com/company/lansweeper-bvba/
Contact ► Sales@lansweeper.com
Видео NVIDIA GPU Display Driver Vulnerabilities | CVE-2022-31610 | CVE-2022-31617 | CVE-2022-31606 канала Lansweeper
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![OT Scanning and Asset Management with Lansweeper - Quick Demo](https://i.ytimg.com/vi/LBj__50fqro/default.jpg)
![Lansweeper API - How to create an Identity Code for Integrations](https://i.ytimg.com/vi/Ym1iV3sYkVg/default.jpg)
![Diagrams for Network Topology and Virtual Environments in Lansweeper Cloud](https://i.ytimg.com/vi/LminSAWBe_o/default.jpg)
![Lansweeper Testimonial | Brothers of Charity](https://i.ytimg.com/vi/iPt6XSMV7w8/default.jpg)
![Lansweeper training tutorial #9 - Risk Assessment – Vulnerabilities](https://i.ytimg.com/vi/x--7O4r_OEI/default.jpg)
![Intel Meltdown CPU Flaw Vulnerability exploit](https://i.ytimg.com/vi/7EhaOSqop9c/default.jpg)
![Should You Migrate to OpenJDK after Oracle JDK Price Change?](https://i.ytimg.com/vi/NBdyGQJVdcw/default.jpg)
![ITAM 2.0 - A Universal IT Asset Data Inventory as the Foundation for Efficient IT Management](https://i.ytimg.com/vi/zPB_KRvPa_w/default.jpg)
![How to get a list of vCenter, VMware and Citrix Virtual machines](https://i.ytimg.com/vi/HBnxOJoImbw/default.jpg)
![Veeam End of Life (EOL) - February 2023](https://i.ytimg.com/vi/XD6vUHx2zaQ/default.jpg)
![Lansweeper Pro Tip #39 - Passive Network Scanning](https://i.ytimg.com/vi/sRp6x5u7j58/default.jpg)
![Microsoft Exchange Server End Of Life](https://i.ytimg.com/vi/IV4IEhftpP8/default.jpg)
![IT Asset Management Software | Lansweeper](https://i.ytimg.com/vi/WvsjZ_y1sEE/default.jpg)
![Lansweeper Pro Tip #53 - Discover Startup Applications](https://i.ytimg.com/vi/6mHfYuukviI/default.jpg)
![HP Support Assistant Vulnerability - CVE-2022-38395](https://i.ytimg.com/vi/6Ja8eZ2eifo/default.jpg)
![Security Insights in Lansweeper Cloud](https://i.ytimg.com/vi/tDbqoOsmEr4/default.jpg)
![Microsoft Endpoint Configuration Manager (SCCM) End of Life](https://i.ytimg.com/vi/5TFSIAi1fIA/default.jpg)
![Lansweeper training tutorial #6 - Credential Free Device Recognition](https://i.ytimg.com/vi/4sh3ZOHopkk/default.jpg)
![Lansweeper Pro Tip #54 - Schedule LsAgent to Run at User Logon](https://i.ytimg.com/vi/N1oHoadcajU/default.jpg)
![Lansweeper Pro Tip #42 - Lansweeper & Devolutions Remote Desktop Manager](https://i.ytimg.com/vi/tBmd_Z8b9Gc/default.jpg)