Vulnerability Description
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nvidia | Virtual Gpu Manager | >= 8.0, < 8.5 |
Related Weaknesses (CWE)
References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5075Vendor Advisory
- https://nvidia.custhelp.com/app/answers/detail/a_id/5075Vendor Advisory
FAQ
What is CVE-2020-5987?
CVE-2020-5987 is a vulnerability with a CVSS score of 7.8 (HIGH). NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest ...
How severe is CVE-2020-5987?
CVE-2020-5987 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5987?
Check the references section above for vendor advisories and patch information. Affected products include: Nvidia Virtual Gpu Manager.