6.5
CVE-2024-0137
- EPSS 0.07%
- Veröffentlicht 28.01.2025 03:15:07
- Zuletzt bearbeitet 06.10.2025 14:08:34
- Quelle psirt@nvidia.com
- CVE-Watchlists
- Unerledigt
NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code running in the host’s network namespace. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to denial of service and escalation of privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nvidia ≫ Nvidia Container Toolkit Version < 1.17.3
Nvidia ≫ Nvidia Gpu Operator Version < 24.9.1
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.218 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.3 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
|
| psirt@nvidia.com | 5.5 | 1.3 | 3.7 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
|
CWE-653 Improper Isolation or Compartmentalization
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.