7.6
CVE-2024-0135
- EPSS 0.1%
- Veröffentlicht 28.01.2025 03:15:07
- Zuletzt bearbeitet 06.10.2025 14:06:00
- Quelle psirt@nvidia.com
- CVE-Watchlists
- Unerledigt
NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to modification of a host binary. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nvidia ≫ Nvidia Container Toolkit Version < 1.17.3
Nvidia ≫ Nvidia Gpu Operator Version < 24.9.1
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.277 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.6 | 1 | 6 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
|
| psirt@nvidia.com | 7.6 | 1 | 6 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
|
CWE-653 Improper Isolation or Compartmentalization
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.