Skip to content

NVIDIA Patches High-Severity Vulnerabilities in Hopper HGX 8-GPU HMC

NVIDIA Patches High-Severity Vulnerabilities in Hopper HGX 8-GPU HMC
NVIDIA Patches High-Severity Vulnerabilities in Hopper HGX 8-GPU HMC
2:13

NVIDIA has recently released a crucial security update for its Hopper HGX 8-GPU systems, addressing two significant vulnerabilities that could potentially compromise system integrity and data security.

Understanding the Vulnerabilities

  1. CVE-2024-0114
    This high-severity flaw resides in the HGX Management Controller (HMC). If an attacker gains administrative access to the Baseboard Management Controller (BMC), they could exploit this vulnerability to assume administrator privileges on the HMC. Such an exploit could lead to unauthorized code execution, denial of service, privilege escalation, information disclosure, and data tampering. ​(nvidia.custhelp.com)

  2. CVE-2024-0141
    This medium-severity issue is found in the GPU vBIOS. An attacker with tenant-level GPU access might write to an unsupported registry, causing the system to enter an unstable state, potentially leading to a denial of service.

Impacted Versions

The vulnerabilities affect multiple HGX firmware versions, including:

  • HGX-22.10-1-rc67 (1.5.0)
  • HGX-22.10-1-rc63 (1.4.0)
  • HGX-22.10-1-rc59 (1.3.2)
  • HGX-22.10-1-rc57 (1.3.0/1.3.1)

NVIDIA strongly recommends that users and administrators update their systems to firmware version 1.6.0 or later to mitigate these vulnerabilities.

The Bigger Picture

These vulnerabilities highlight the critical importance of securing GPU infrastructures, especially as GPUs are increasingly utilized for tasks beyond graphics rendering, such as artificial intelligence and data analytics. Ensuring the security of management controllers and firmware is essential to maintain the integrity and reliability of these high-performance systems.

Conclusion

Promptly addressing these vulnerabilities is vital for organizations relying on NVIDIA's Hopper HGX 8-GPU systems. By updating to the latest firmware and reviewing security configurations, users can safeguard their systems against potential threats and maintain operational integrity.