CVE-2024-0113
Nvidia
CVE-2024-0113: A path traversal vulnerability exists in NVIDIA Mellanox products. This allows attackers to potentially escalate privileges and disclose sensitive information. CVE-2024-0113 affects NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC due to a flaw in the web support component, enabling CGI path traversal through specially crafted URIs. Although the CVSS score is high at 8.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a lower immediate risk compared to vulnerabilities with SVRS scores above 80. Successful exploitation could grant unauthorized access and expose confidential data. It's crucial to patch this vulnerability to prevent potential privilege escalation and data breaches. This information disclosure risk makes patching a priority. While the SVRS indicates it might not be the most pressing issue, remediation is still advised.
Description
CVE-2024-0113 is a vulnerability in NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC that allows an attacker to cause a CGI path traversal by a specially crafted URI. This could lead to escalation of privileges and information disclosure. The CVSS score is 8.8, indicating a high severity level. However, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk level. This is because the SVRS takes into account additional factors such as social media, news, code repositories, dark/deep web data, and associations with threat actors and malware.
Key Insights
- This vulnerability could allow an attacker to gain escalated privileges on the affected system.
- The vulnerability is relatively easy to exploit, as it only requires a specially crafted URI.
- There are no known active exploits for this vulnerability at this time.
- CISA has not issued a warning for this vulnerability.
Mitigation Strategies
- Update to the latest version of NVIDIA Mellanox OS, ONYX, Skyway, or MetroX-3 XCC.
- Restrict access to the affected system from untrusted networks.
- Implement a web application firewall (WAF) to block malicious requests.
- Monitor the system for any suspicious activity.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.