{"id":564,"date":"2025-05-20T15:21:54","date_gmt":"2025-05-20T15:21:54","guid":{"rendered":"https:\/\/inforb-wp.demo.certsign.ro\/?p=564"},"modified":"2025-05-26T08:12:16","modified_gmt":"2025-05-26T08:12:16","slug":"vulnerabilitatea-nvidia-ufm-le-a-permis-atacatorilor-sa-si-escaladeze-privilegiile-2","status":"publish","type":"post","link":"https:\/\/inforb.ro\/en\/vulnerabilitatea-nvidia-ufm-le-a-permis-atacatorilor-sa-si-escaladeze-privilegiile-2\/","title":{"rendered":"The NVIDIA UFM vulnerability allowed attackers to escalate their privileges."},"content":{"rendered":"<p>A high-severity vulnerability was recently disclosed by NVIDIA on November 26, 2024, affecting UFM Enterprise, UFM Appliance, and UFM CyberAI products.<\/p>\n\n\n\n<p>The flaw, identified as CVE-2024-0130, could allow attackers to <a href=\"https:\/\/cybersecuritynews.com\/zoom-vulnerabilities-escalate-privileges\/\" data-type=\"link\" data-id=\"https:\/\/cybersecuritynews.com\/zoom-vulnerabilities-escalate-privileges\/\">escalate their privileges<\/a>, to modify data, cause a denial of service (DoS), and access sensitive information.<\/p>\n\n\n\n<p>The security issue, which received a CVSS v3.1 base score of 8.8, originates from an improperly implemented authentication mechanism.<\/p>\n\n\n\n<p>Attackers can exploit this vulnerability by sending malformed requests through the Ethernet management interface of affected UFM systems.<\/p>\n\n\n\n<p>NVIDIA <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5584\" data-type=\"link\" data-id=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5584\">declared<\/a>: \u201cA successful exploitation of this vulnerability could lead to privilege escalation, data manipulation, service disruption, and information disclosure.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-purelogs-a-least-expensive-infostealer\"><strong>Products and versions affected<\/strong><\/h2>\n\n\n\n<p>The vulnerability affects multiple versions within NVIDIA\u2019s UFM product range, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>UFM Enterprise GA<\/strong>&nbsp;(versions 6.15.x, 6.16.x, 6.17.x)<\/li>\n\n\n\n<li><strong>UFM Enterprise LTS23<\/strong>&nbsp;(versions 6.15.x LTS older than 6.15.6-4 LTS)<\/li>\n\n\n\n<li><strong>UFM Enterprise Appliance GA<\/strong>&nbsp;(versions 1.6.x, 1.7.x, 1.8.x)<\/li>\n\n\n\n<li><strong>UFM Enterprise Appliance LTS23<\/strong>&nbsp;(versions 1.6.x LTS older than 1.6.6-1 LTS)<\/li>\n\n\n\n<li><strong>UFM SDN Appliance GA<\/strong>&nbsp;(versions 4.14.x, 4.15.x, 4.16.x)<\/li>\n\n\n\n<li><strong>UFM SDN Appliance LTS23<\/strong>&nbsp;(versions 4.14.x LTS older than 4.14.6.4 LTS)<\/li>\n\n\n\n<li><strong>UFM CyberAI GA<\/strong>&nbsp;(versions 2.6.x, 2.7.x, 2.8.x)<\/li>\n\n\n\n<li><strong>UFM CyberAI LTS23<\/strong>&nbsp;(version 2.6.1-3 LTS)<\/li>\n<\/ul>\n\n\n\n<p>NVIDIA has released firmware updates to address <a href=\"https:\/\/cybersecuritynews.com\/category\/vulnerability\/\" data-type=\"link\" data-id=\"https:\/\/cybersecuritynews.com\/category\/vulnerability\/\">the vulnerability<\/a> in all products affected. Users are strongly advised to download and install these updates immediately from the NVIDIA Enterprise support portal.<\/p>\n\n\n\n<p>It is important to note that the vulnerability can primarily be exploited through the Ethernet management interface of UFM systems, which, in most cases, is isolated from public networks.<\/p>\n\n\n\n<p>Additionally, the LTS22 versions of UFM products are not affected by this vulnerability. This security flaw underscores the critical importance of promptly\u00a0<a href=\"https:\/\/cybersecuritynews.com\/patching-on-time-thwarts-cybercrime-security-patch-management-guide\/\" data-type=\"link\" data-id=\"https:\/\/cybersecuritynews.com\/patching-on-time-thwarts-cybercrime-security-patch-management-guide\/\">updates<\/a>, especially for infrastructure management tools like NVIDIA's UFM suite.<\/p>\n\n\n\n<p>Given that these systems often have privileged access to <a href=\"https:\/\/cybersecuritynews.com\/restricting-access-to-resources-improves-cyber-security\/\" data-type=\"link\" data-id=\"https:\/\/cybersecuritynews.com\/restricting-access-to-resources-improves-cyber-security\/\">network resources<\/a>, any exploited vulnerability can lead to a widespread compromise of the infrastructure.<\/p>\n\n\n\n<p>Administratorii IT sunt \u00eencuraja\u021bi s\u0103 revizuiasc\u0103 configura\u021biile re\u021belei \u0219i s\u0103 se asigure c\u0103\u00a0interfe\u021bele de management sunt corect izolate\u00a0de re\u021belele nesigure.<\/p>\n\n\n\n<p>IT administrators are encouraged to review network configurations and ensure that management interfaces are properly isolated from untrusted networks.<\/p>\n\n\n\n<p>The articles&nbsp;<a href=\"https:\/\/cybersecuritynews.com\/nvidia-ufm-vulnerability\/\">NVIDIA UFM Vulnerability Let Attackers Escalate Privileges<\/a>&nbsp;appeared originally on&nbsp;<a href=\"https:\/\/cybersecuritynews.com\/\">Cyber Security News<\/a>.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in NVIDIA UFM products, exploitable through the Ethernet management interface, allows privilege escalation and data compromise, making it essential for organizations to immediately apply the provided security updates.<\/p>","protected":false},"author":1,"featured_media":561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-with-sidebar","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[39],"class_list":["post-564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-homepage"],"_links":{"self":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":3,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/564\/revisions"}],"predecessor-version":[{"id":882,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/564\/revisions\/882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media\/561"}],"wp:attachment":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media?parent=564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/categories?post=564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/tags?post=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}