CVE-2022-31612 An NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiEscape where a local user with basic capabilities can cause an out-of-bounds read which may lead to a system crash or a leak of information.

CVE-2022-31612 An NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiEscape where a local user with basic capabilities can cause an out-of-bounds read which may lead to a system crash or a leak of information.

This issue is rated as critical due to the possibility of remote code execution. End users running virtualization software that emulates hardware, such as Microsoft Hyper-V, may be at risk due to the fact that many virtualization vendors rely on the kernel mode layer of the graphics driver to function.

What’s the risk?

A local attacker can cause an out-of-bounds read in the kernel mode layer handler for DxgkDdiEscape, which leads to remote code execution.

CVE-2018-12126 has been assigned to this issue.

How does this affect users?

An attacker can exploit this issue to cause a system crash or obtain sensitive information.

What’s being done to address the issue?

Red Faction has released an update for the affected software, and is working on releasing an update for Windows.

If you have this installed on your system, you are encouraged to apply the update from Red Faction as soon as possible.

END USER ACTIONS:

If you have this installed on your system, you are encouraged to apply the update from Red Faction as soon as possible.

Windows 10 (Version 1709)

Microsoft has released a patch for CVE-2018-12126. It is important to install this update as soon as possible, but you must make sure the following requirements are met:

The system cannot be running in compatibility mode.
The operating system is running on either x64 or x86 processor architecture (not both).
If you have these requirements met, you can follow these steps to apply the update:

Microsoft Hyper-V virtualization vulnerability

This issue is rated as critical due to the possibility of remote code execution. End users running virtualization software that emulates hardware, such as Microsoft Hyper-V, may be at risk due to the fact that many virtualization vendors rely on the kernel mode layer of the graphics driver to function.

What’s the risk?
A local attacker can cause an out-of-bounds read in the kernel mode layer handler for DxgkDdiEscape, which leads to remote code execution.

CVE-2018-12126 has been assigned to this issue.
How does this affect users?
An attacker can exploit this issue to cause a system crash or obtain sensitive information.
What’s being done to address the issue?
Red Faction has released an update for the affected software, and is working on releasing an update for Windows.

Microsoft is aware of this issue and is working to provide a solution .

Microsoft updates for CVE-2018-12126

The Microsoft Hyper-V Virtualization Driver component has been updated to addresses the vulnerability.

Microsoft recommends users install this update as soon as possible.

END USER ACTIONS:

Red Faction updates are available at https://www.redfactiongames.com/en/updates/.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe