{"id":5873,"date":"2025-05-18T02:32:11","date_gmt":"2025-05-17T18:32:11","guid":{"rendered":"https:\/\/cicserver.com\/nvidia-flaws-expose-ai-models-critical-infrastructure\/"},"modified":"2025-05-18T02:32:11","modified_gmt":"2025-05-17T18:32:11","slug":"nvidia-flaws-expose-ai-models-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/nvidia-flaws-expose-ai-models-critical-infrastructure\/","title":{"rendered":"Nvidia Flaws Expose AI Models, Critical Infrastructure"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Researchers are urging enterprises that rely on Nvidia GPUs for their AI workloads to ensure that systems are patched against critical security vulnerabilities in an NVIDIA toolkit for running GPU-accelerated containers. If exploited, the bugs can allow attackers to gain access to sensitive data,\u00a0<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/tpuxtract-attackers-steal-ai-models\">steal proprietary AI models<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, or create operational disruptions.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">NVIDIA released an update last September to patch\u00a0<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0132\">CVE-2024-0132<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, a time-of-check time-of-use (TOCTOU) vulnerability that earned a CVSS rating of 9 out of 10, in the NVIDIA Container Toolkit.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">However, after closer inspection, researchers from Trend Micro and Wiz separately discovered a secondary flaw that the patch did not mitigate, so some users, even on patched systems, would still be at risk.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Researchers at Trend Micro flagged what they deemed this &#8220;incomplete&#8221; fix for CVE-2024-0132 in a\u00a0<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/d\/incomplete-nvidia-patch.html\">recent blog post<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">\u00a0and wrote the related bug allows denial-of-service (DoS). This may have created confusion among those who thought their systems were protected once the initial patch was applied, security experts say.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_italic\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/cloud-security\/buggy-nvdia-patch-exposes-ai-models-critical-infrastructure\">Keep reading his article in Dark Reading, a Data Center Knowledge partner site<\/a><\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Researchers are urging enterprises that rely on Nvidia GPUs for their AI workloads to ensure that systems are patched against critical security vulnerabilities in an NVIDIA toolkit for running GPU-accelerated containers. If exploited, the bugs can allow attackers to gain access to sensitive data,\u00a0steal proprietary AI models, or create operational disruptions. NVIDIA released an update [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5874,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5873","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5873"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5874"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}