Arbitrary File Write Vulnerability in NVIDIA Triton Inference Server for Linux Could Lead to Code Execution, Denial of Service, and More
CVE-2024-0087
9CRITICAL
Summary
The NVIDIA Triton Inference Server for Linux has a vulnerability that permits a user to direct log output to an arbitrary file location. This capability can lead to the unintentional overwriting of existing log files if they are present, which can result in various security risks. Subsequent exploitation may allow for unauthorized code execution, denial of service, and unauthorized access to sensitive information, increasing the opportunity for data tampering and privilege escalation. This vulnerability emphasizes the importance of careful log file management and security configurations to mitigate potential threats.
Affected Version(s)
NVIDIA Triton Inference Server 22.09 to 24.03
References
CVSS V3.1
Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved