CVE-2023-25519 (GCVE-0-2023-25519)
Vulnerability from cvelistv5
Published
2023-09-12 00:49
Modified
2024-09-26 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
References
► | URL | Tags | |
---|---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | NVIDIA | BlueField 1 |
Version: All versions after 18.24.1000 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:18.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_2_ga", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "24.38.1002", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_3_ga", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "32.38.1002", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_1", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "18.24.1000", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "bluefield_2_lts", "vendor": "nvidia", "versions": [ { "lessThan": "*", "status": "affected", "version": "24.35.3006", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-25519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T14:47:11.312620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T14:54:04.307Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BlueField 1", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions after 18.24.1000" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 2 LTS", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 24.35.3006" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 2 GA", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 24.38.1002" } ] }, { "defaultStatus": "unaffected", "product": "BlueField 3 GA", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All versions prior to 32.38.1002" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u003c/span\u003e\u003cb\u003e\u0026nbsp; \u003c/b\u003e\n\n" } ], "value": "\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u00a0 \n\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Escalation of Privileges" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-286", "description": "CWE-286", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-12T00:49:21.411Z", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2023-25519", "datePublished": "2023-09-12T00:49:21.411Z", "dateReserved": "2023-02-07T02:57:17.085Z", "dateUpdated": "2024-09-26T14:54:04.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-25519\",\"sourceIdentifier\":\"psirt@nvidia.com\",\"published\":\"2023-09-12T02:15:10.173\",\"lastModified\":\"2024-11-21T07:49:39.393\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u00a0 \\n\\n\"},{\"lang\":\"es\",\"value\":\"NVIDIA ConnectX Host Firmware para BlueField Data Processing Unit contiene una vulnerabilidad en la que un anfitri\u00f3n restringido puede provocar un error de administraci\u00f3n de usuarios incorrecto. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una escalada de privilegios.\u0026#xa0;\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-286\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.24.1000\",\"matchCriteriaId\":\"C650DAD0-9A63-45B7-BDEF-7CCB3B1256FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"485AAB91-2835-4ABF-BBA9-647F73111358\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"24.35.3006\",\"matchCriteriaId\":\"6E192997-A07E-4D32-A164-E82F6F3302DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A755B8-4FF4-4209-9E49-580159B9DFC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"24.38.1002\",\"matchCriteriaId\":\"53E136D7-66BB-49E1-A9E2-7E1B58A74ABA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC213CA8-C172-4AB5-B66B-A5C71F470F33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"32.38.1002\",\"matchCriteriaId\":\"82957F72-C974-4407-AC3F-10F6678AF0F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1A941D7-49CE-49DA-A730-71C598D11EE9\"}]}]}],\"references\":[{\"url\":\"https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5479\",\"source\":\"nvd@nist.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T11:25:18.819Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-25519\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T14:47:11.312620Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"bluefield_2_ga\", \"versions\": [{\"status\": \"affected\", \"version\": \"24.38.1002\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"bluefield_3_ga\", \"versions\": [{\"status\": \"affected\", \"version\": \"32.38.1002\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"bluefield_1\", \"versions\": [{\"status\": \"affected\", \"version\": \"18.24.1000\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"bluefield_2_lts\", \"versions\": [{\"status\": \"affected\", \"version\": \"24.35.3006\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T14:52:21.486Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"Escalation of Privileges\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NVIDIA\", \"product\": \"BlueField 1\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions after 18.24.1000\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NVIDIA\", \"product\": \"BlueField 2 LTS\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions prior to 24.35.3006\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NVIDIA\", \"product\": \"BlueField 2 GA\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions prior to 24.38.1002\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NVIDIA\", \"product\": \"BlueField 3 GA\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions prior to 32.38.1002\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\\u00a0 \\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u003c/span\u003e\u003cb\u003e\u0026nbsp; \u003c/b\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-286\", \"description\": \"CWE-286\"}]}], \"providerMetadata\": {\"orgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"shortName\": \"nvidia\", \"dateUpdated\": \"2023-09-12T00:49:21.411Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-25519\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-26T14:54:04.307Z\", \"dateReserved\": \"2023-02-07T02:57:17.085Z\", \"assignerOrgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"datePublished\": \"2023-09-12T00:49:21.411Z\", \"assignerShortName\": \"nvidia\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…