Vulnerability Description
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nvidia | Virtual Gpu Manager | >= 8.0, < 8.7 |
| Citrix | Hypervisor | - |
| Nutanix | Ahv | - |
| Redhat | Enterprise Linux Kernel-Based Virtual Machine | - |
| Vmware | Vsphere | - |
Related Weaknesses (CWE)
References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5172Vendor Advisory
- https://nvidia.custhelp.com/app/answers/detail/a_id/5172Vendor Advisory
FAQ
What is CVE-2021-1082?
CVE-2021-1082 is a vulnerability with a CVSS score of 7.8 (HIGH). NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denia...
How severe is CVE-2021-1082?
CVE-2021-1082 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-1082?
Check the references section above for vendor advisories and patch information. Affected products include: Nvidia Virtual Gpu Manager, Citrix Hypervisor, Nutanix Ahv, Redhat Enterprise Linux Kernel-Based Virtual Machine, Vmware Vsphere.