pwshub.com

Critical Nvidia bug allows container escape, host takeover

A critical bug in Nvidia's widely used Container Toolkit could allow a rogue user or software to escape their containers and ultimately take complete control of the underlying host.

The flaw, tracked as CVE-2024-0132, earned a 9.0 out of 10 CVSS severity rating, and affects all versions of Container Toolkit up to and including v1.16.1, and Nvidia GPU Operator up to and including 24.6.1.

Nvidia issued a fix on Wednesday with the latest version of Container Toolkit (v1.16.2) and Nvidia GPU Operator (v24.6.2). The vulnerability does not impact use cases where Container Device Interface (CDI) is used.

This particular library is used across clouds and AI workloads. According to infosec house Wiz, 33 percent of cloud environments have a buggy version of Nvidia Container Toolkit installed, rendering them vulnerable.

Wiz security researchers found and disclosed the bug on September 1, and the GPU giant has confirmed it is as concerning as the cloud security shop makes it out to be.

"A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering," Nvidia warned in its security advisory.

Again, this is exploitable by someone or something that's been allowed to or managed to run or run within a container on a vulnerable host.

CVE-2024-0132 is a Time of Check Time of Use (TOCTOU) vulnerability, a type of race condition. This can allow the attacker to gain access to resources that they should not have access to.

Specific to Nvidia Container Toolkit: "Any environment that allows the use of third party container images or AI models – either internally or as-a-service – is at higher risk given that this vulnerability can be exploited via a malicious image," Wiz kids Shir Tamari, Ronen Shustin, Andres Riancho said in a write-up about the bug.

To exploit CVE-2024-0132, an attacker would need to craft a specially designed image and then get the image to run on the target platform, either indirectly, by convincing/tricking the user into running the malicious image, or directly, if the attacker has access to shared GPU resources.

  • HPE patches three critical flaws in Aruba proprietary access protocol Interface
  • Ivanti patches exploited admin command execution flaw
  • VMware patches remote make-me-root holes in vCenter Server, Cloud Foundation
  • Doomsday '9.9 RCE bug' might hit every Linux system

In a single-tenant compute environment, this could happen if a user downloads a malicious container image — say, via a social engineering attack where the user believes the container image is coming from a trusted source. In this scenario, the attacker could then take over the user's workstation.

In a shared environment, such as Kubernetes-powered one, however, a miscreant with permission to deploy a container could escape it and then access data or secrets of other applications on the same node or cluster, the researchers noted. 

This second scenario "is especially relevant for AI service providers that allow customers to run their own GPU-enabled container images," they warned.

"An attacker could deploy a harmful container, break out of it, and use the host machine's secrets to target the cloud service's control systems," the researchers continued. "This could give the attacker access to sensitive information, like the source code, data, and secrets of other customers using the same service." 

Wiz isn't providing too many technical details about how to exploit the vuln because the security shop wants to ensure that vulnerable organizations have time to deploy the fix — and not have their host system taken over with root privileges.

But the researchers promised more to come soon, including exploit details, so it's a good idea to get ahead of the would-be attackers on this one. ®

Source: theregister.com

Related stories
33 minutes ago - No patches yet, remove cups-browsed or block UDP port 631, requires user interaction Final update After days of waiting and anticipation, what was billed as one or more critical unauthenticated remote-code execution vulnerabilities in all...
3 weeks ago - But Bullseye's days are numbered and it's time to think about upgrading The latest update to Debian "Bookworm" arrives at the same time as the last ever update to "Bullseye," and there's trouble ahead for Nvidia legacy users.…
1 month ago - Recent Nvidia graphics drivers (version 555 and newer) are causing Blue Screen of Death (BSOD) errors on Windows PCs with older CPUs that lack the POPCNT (Population Count) instruction. This issue affects Windows 10 users with older...
1 month ago - The setback won't stop us from banking billions, CFO insists Nvidia has confirmed earlier reports that its Blackwell generation of GPUs suffered from a design defect that adversely impacted the yields of the hotly anticipated accelerators.…
2 weeks ago - GPU giant accused of colluding with Microsoft, RPX to sideline startup Nvidia is embroiled in an antitrust'n'patent lawsuit, which alleges the GPU giant colluded with Microsoft and the intellectual property risk management firm RPX to rip...
Other stories
25 minutes ago - Whether you're looking for something for parties or the perfect tool to cook up a delicious dinner, these are the top Dutch ovens for all your culinary needs.
25 minutes ago - David Carnoy shares his first impressions of Samsung's new Galaxy Tab S10 Ultra and S10 Plus AI powered Android tablets meant to compete with Apple's iPad Pro line.
25 minutes ago - Canceling a subscription can sometimes be difficult, which is why California's governor recently passed a law to make it easier.
34 minutes ago - An Intel graphics card from the upcoming Arc Battlemage series has appeared on Geekbench for the first time. Although its performance score aligns with mid-range GPUs, its VRAM capacity, exceptionally high clock speed, and lack of...
1 hour ago - Zorin OS requires only 1.5 GB of RAM and 15 GB of storage, making it ideal for reviving old PCs or for those looking to try a lightweight operating system. The most recent 17.2 release is powered by Linux Kernel 6.8.Read Entire Article