NVIDIA Jetson chipset contains a series of security holes that allow data theft, DDoS attacks
Evaluation from experts shows that these vulnerabilities can completely be abused by hackers to carry out denial of service (DDoS) attacks, and even steal the target's data, according to the report. from Threat Post.
Nvidia has now confirmed the problem and will soon release a patch in the near future. There are a total of 9 vulnerabilities, all rated at high severity. With that said, these vulnerabilities exist in the Jetson framework, so could directly affect millions of IoT devices running NVIDIA Jetson chips, including embedded systems, AI applications, and even devices. Independent automation such as robots, drones, etc.
Some of the affected products identified include Jetson Nano devices (including Jetson Nano 2GB), Xavier NX/TX1, AGX Xavier, Jetson TX2 (including Jetson TX2 NX).
The most serious flaw
Out of the 9 vulnerabilities mentioned above, CVE-2021-34372 is rated as the most severe case, which can expose the Jetson framework to attack through a buffer overflow. While the NVIDIA Security Bulletin explains that an attacker needs access to the local network to carry out such an attack, please note that that's all the hacker needs.
In other words, this is a fairly easy vulnerability to exploit. Once infiltrated, an attacker can take control of the target system by gaining permanent access to various components, not just the NVIDIA chipset, thereby manipulating or sabotaging the system.
Besides CVE-2021-34372, the remaining 8 vulnerabilities include:
- CVE‑2021‑34380
- CVE‑2021‑34379
- CVE‑2021‑34378
- CVE‑2021‑34376
- CVE‑2021‑34377
- CVE‑2021‑34373
- CVE‑2021‑34374
- CVE‑2021‑34375
It should be noted that all of these vulnerabilities have a severity rating of 7 to 7.9 on the CVSS scale. Most of the vulnerabilities affect Jetson's trusted Linux kernel and target the component's heap memory frame. From there, the chipset can be easily manipulated to create various errors. Furthermore, six of these vulnerabilities can be exploited to trigger DDoS attacks.
You should read it
- What to do to protect the device from ZombieLoad attack?
- Detected a serious BIOS vulnerability, affecting many Intel processors
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connection
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worse
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- New vulnerability on MediaTek chip makes 30% of Android smartphones can be eavesdropped
- Apple releases iOS 14.4.2, iOS 12.5.2, and watchOS 7.3.3 updates that patch the critical zero-day vulnerability
May be interested
- Most Android anti-virus software cannot detect malicious APK filesapk file containing malicious code is a method that hackers often use to attack android users. unlike ios, android users can download and install apps from third-party app stores or download the app's apk file and install it themselves.
- Paradise ransomware source code shared on hacker forumthe entire source code of the paradise ransomware has been shared on a hacker forum called xss.is. based on this source code, even novice cybercriminals can create their own custom ransomware.
- SolarMarker malware puts users at riskmicrosoft is tracking a series of attacks that use seo poisoning to infect targets with a remote access trojan (rat) that is capable of stealing victims' sensitive information and backing up their systems.
- Hackers can spy on Samsung users with pre-installed appssergey toshin - founder of oversecure company specializing in mobile application security, has found more than a dozen vulnerabilities affecting samsung devices, allowing hackers to steal information and track users.
- Detecting new culprits attacking Windows 10kaspersky security researchers have discovered a new culprit - puzzlemaker - who used the google chrome and windows 10 zero-day exploit chain in highly targeted attacks against multiple companies all around the world.
- Warning of Critical Vulnerability Affecting Realtek Wi-Fi Modulesthrough these vulnerabilities, malicious actors can completely gain higher privileges on the target device.