Vulnerabilites related to nvidia - bluefield_2_lts
CVE-2023-25519 (GCVE-0-2023-25519)
Vulnerability from cvelistv5
Published
2023-09-12 00:49
Modified
2024-09-26 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | NVIDIA | BlueField 1 |
Version: All versions after 18.24.1000 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:18.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_2_ga", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "24.38.1002", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_3_ga", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "32.38.1002", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_1", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "18.24.1000", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_2_lts", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "24.35.3006", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-25519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T14:47:11.312620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T14:54:04.307Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BlueField 1", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions after 18.24.1000" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 2 LTS", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 24.35.3006" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 2 GA", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 24.38.1002" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 3 GA", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 32.38.1002" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u003c/span\u003e\u003cb\u003e\u0026nbsp; \u003c/b\u003e\n\n" } ], "value": "\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u00a0 \n\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Escalation of Privileges" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-286", "description": "CWE-286", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-12T00:49:21.411Z", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2023-25519", "datePublished": "2023-09-12T00:49:21.411Z", "dateReserved": "2023-02-07T02:57:17.085Z", "dateUpdated": "2024-09-26T14:54:04.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31037 (GCVE-0-2023-31037)
Vulnerability from cvelistv5
Published
2024-01-24 02:12
Modified
2025-06-09 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
NVIDIA | Bluefield 2 DPU BMC, BlueField 3 DPU BMC |
Version: LTS:2.8.2-46, 23.04, 23.07, 23.09 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:45:25.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5511" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-31037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T16:59:34.215313Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T20:48:11.032Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Bluefield 2 DPU BMC, BlueField 3 DPU BMC", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "LTS:2.8.2-46, 23.04, 23.07, 23.09" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in \u003c/span\u003e\u003ccode\u003eipmitool\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.\u003c/span\u003e\n\n" } ], "value": "\nNVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.\n\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Code execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-24T02:12:30.123Z", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5511" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2023-31037", "datePublished": "2024-01-24T02:12:30.123Z", "dateReserved": "2023-04-22T02:38:33.414Z", "dateUpdated": "2025-06-09T20:48:11.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-09-12 02:15
Modified
2024-11-21 07:49
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nvidia | bluefield_1_firmware | * | |
nvidia | bluefield_1 | - | |
nvidia | bluefield_2_lts_firmware | * | |
nvidia | bluefield_2_lts | - | |
nvidia | bluefield_2_ga_firmware | * | |
nvidia | bluefield_2_ga | - | |
nvidia | bluefield_3_ga_firmware | * | |
nvidia | bluefield_3_ga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C650DAD0-9A63-45B7-BDEF-7CCB3B1256FF", "versionStartIncluding": "18.24.1000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "485AAB91-2835-4ABF-BBA9-647F73111358", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E192997-A07E-4D32-A164-E82F6F3302DE", "versionEndExcluding": "24.35.3006", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1A755B8-4FF4-4209-9E49-580159B9DFC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53E136D7-66BB-49E1-A9E2-7E1B58A74ABA", "versionEndExcluding": "24.38.1002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC213CA8-C172-4AB5-B66B-A5C71F470F33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82957F72-C974-4407-AC3F-10F6678AF0F2", "versionEndExcluding": "32.38.1002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1A941D7-49CE-49DA-A730-71C598D11EE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u00a0 \n\n" }, { "lang": "es", "value": "NVIDIA ConnectX Host Firmware para BlueField Data Processing Unit contiene una vulnerabilidad en la que un anfitri\u00f3n restringido puede provocar un error de administraci\u00f3n de usuarios incorrecto. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una escalada de privilegios.\u0026#xa0;" } ], "id": "CVE-2023-25519", "lastModified": "2024-11-21T07:49:39.393", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@nvidia.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-12T02:15:10.173", "references": [ { "source": "psirt@nvidia.com", "tags": [ "Broken Link" ], "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" }, { "source": "nvd@nist.gov", "tags": [ "Vendor Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" } ], "sourceIdentifier": "psirt@nvidia.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-286" } ], "source": "psirt@nvidia.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-24 03:15
Modified
2024-11-21 08:01
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nvidia | bluefield_bmc | 2.8.2-46 | |
nvidia | bluefield_bmc | 23.04 | |
nvidia | bluefield_bmc | 23.07 | |
nvidia | bluefield_bmc | 23.09 | |
nvidia | bluefield_2_ga | - | |
nvidia | bluefield_2_lts | - | |
nvidia | bluefield_3_ga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:bluefield_bmc:2.8.2-46:*:*:*:lts:*:*:*", "matchCriteriaId": "7A4D4343-2910-4C4A-B68D-9AE8FC68F8C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:bluefield_bmc:23.04:*:*:*:-:*:*:*", "matchCriteriaId": "73DE11D8-3B29-46D0-B111-A06DB49909A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:bluefield_bmc:23.07:*:*:*:-:*:*:*", "matchCriteriaId": "7D35EB35-A333-4149-A5AB-3CD54A34FDB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:bluefield_bmc:23.09:*:*:*:-:*:*:*", "matchCriteriaId": "94EE0617-9D9F-4322-BB57-60868EBA6CA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC213CA8-C172-4AB5-B66B-A5C71F470F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1A755B8-4FF4-4209-9E49-580159B9DFC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1A941D7-49CE-49DA-A730-71C598D11EE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nNVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.\n\n" }, { "lang": "es", "value": "NVIDIA Bluefield 2 y Bluefield 3 DPU BMC contienen una vulnerabilidad en ipmitool, donde un usuario root puede provocar la inyecci\u00f3n de c\u00f3digo mediante una llamada de red. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo en el sistema operativo." } ], "id": "CVE-2023-31037", "lastModified": "2024-11-21T08:01:17.800", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "psirt@nvidia.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-24T03:15:08.100", "references": [ { "source": "psirt@nvidia.com", "tags": [ "Vendor Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5511" } ], "sourceIdentifier": "psirt@nvidia.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "psirt@nvidia.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }