Cisco Talos, led by Piotr Bania, has uncovered significant vulnerabilities affecting NVIDIA’s D3D10 driver, commonly used for NVIDIA graphics cards. The shader functionality of this driver has been found to be susceptible to memory corruption when exposed to a specially crafted shader packer.
This exposure can lead to severe memory corruption issues within the driver itself. These vulnerabilities, bearing the designations TALOS-2023-1719 (CVE-2022-34671), TALOS-2023-1720 (CVE-2022-34671), and TALOS-2023-1721 (CVE-2022-34671), hold a high CVSS severity rating of 8.5 out of 10, signifying their substantial impact.
The exploitation of these vulnerabilities raises concerns about guest-to-host escape attacks, particularly from guest machines operating within virtualization environments such as VMware, QEMU, and VirtualBox. This echoes previous vulnerabilities found in NVIDIA graphics drivers.
Cisco Talos researchers have also highlighted the potential for these vulnerabilities to be triggered through web browsers utilizing WebGL and WebAssembly technologies. In a notable example, the researchers managed to initiate these vulnerabilities from a HYPER-V guest using the deprecated RemoteFX feature, leading to the execution of vulnerable code on the HYPER-V host within the rdvgm.exe process.
Recognizing the seriousness of these findings, Talos collaborated with NVIDIA to ensure that these vulnerabilities are promptly addressed. An update has been developed and provided for affected users, aligning with Cisco’s commitment to responsible vulnerability disclosure.
To further enhance security measures, Snort coverage (SIDs 61386, 61387, 61398, 61399, 61410, and 61411) has been created to identify exploitation attempts linked to these vulnerabilities. Users are advised to access the latest rule sets from Snort.org and stay informed through Talos Intelligence’s official Vulnerability Advisories.