Product
Security

NVIDIA takes security concerns seriously and works to quickly evaluate and address them. Once a security concern is reported, NVIDIA commits the appropriate resources to analyse, validate and provide corrective actions to address the issue.

  • SECURITY BULLETINS
  • REPORT VULNERABILITY
  • PSIRT POLICIES
  • ACKNOWLEDGEMENTS
  • PGP KEY

Below is a list of published Security Bulletins. NVIDIA recommends following the guidance given in these bulletins regarding driver or software package updates, or specified mitigations.

Customers are strongly advised to subscribe to NVIDIA Security Bulletins notifications to stay informed of initial release or major revisions to NVIDIA Security Bulletins. You can subscribe to notifications here.

For information about NVIDIA Security Bulletins, see the Security Bulletin section of the PSIRT Policies page.

2018
Security Bulletin ID Title CVEs Publish Date Last Updated
4649 Security Bulletin: NVIDIA GPU Display Driver security updates for multiple vulnerabilities CVE-2018-6251: Denial of service or code execution

CVE-2018-6247, CVE-2018-6248, CVE-2018-6249, CVE-2018-6250: Denial of service or escalation of privileges

CVE-2018-6252, CVE-2018-6253: Denial of service
03/28/2018 03/28/2018
4632 Security Bulletin: NVIDIA SHIELD Tablet security update for a Media Server vulnerability CVE-2017-6276: Denial of service and escalation of privileges 03/22/2018 03/22/2018
4635 Security Bulletin: NVIDIA Jetson TX1, Jetson TK1, Jetson TX2, and Tegra K1 L4T security updates for multiple vulnerabilities CVE-2017-0339: Code execution, denial of service or information disclosure

CVE-2017-0328, CVE- 2017-6248: Denial of service

CVE-2016-6776, CVE-2017-6274, CVE-2017-6275, CVE-2017-6276, CVE-2017-6278: Denial of service and escalation of privileges

CVE-2017-6282: Escalation of privileges or information disclosure

CVE-2017-6283, CVE-2017-0448: Information disclosure
03/20/2018 05/25/2018
4631 Security Bulletin: NVIDIA SHIELD TV Security Updates for Multiple Vulnerabilities Denial of Service or Escalation of Privileges: CVE-2017-6279, CVE-2017-6281, CVE-2017-13175, CVE-2017-6276, CVE-2017-6296

Denial of Service or Information Disclosure: CVE-2017-6295

Escalation of Privileges: CVE-2017-6282

Information Disclosure: CVE-2017-6283, CVE-2017-6284
02/15/2018 02/15/2018
4610 Security Bulletin: NVIDIA GeForce Experience Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/09/2018 01/16/2018
4617 Security Bulletin: NVIDIA Jetson TX2 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/05/2018 03/13/2018
4616 Security Bulletin: NVIDIA Jetson TX1, Jetson TK1, and Tegra K1 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/05/2018 03/13/2018
4614 Security Bulletin: NVIDIA Shield Tablet Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/04/2018 03/22/2018
4613 Security Bulletin: NVIDIA Shield TV Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/04/2018 01/31/2018
4611 Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/04/2018 02/14/2018
4609 Security Notice: CPU Speculative Side Channel Vulnerabilities Information disclosure: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 01/03/2018 01/03/2018

2017

2016

2015

2014

2013

If you need to report a security issue, please use the appropriate contact points outlined below:

Problem or issue

NVIDIA contact or resource

How do I report a security issue on a NVIDIA web page?

Email Application Security team

How do I report a potential security vulnerability in a NVIDIA product?

OEM Partners should contact their Customer Program Manager.

NVIDIA encourages coordinated disclosure of security vulnerabilities through the Product Security Incident Response Team. Security researchers, industry groups, government organizations and vendors can report potential security vulnerabilities to NVIDIA PSIRT using the Security Vulnerability Submission Form or by emailing NVIDIA PSIRT*.

How do I provide feedback on a NVIDIA product or service?

Visit NVIDIA Support Website

Where do I get technical support for my NVIDIA product?

Visit NVIDIA Support Website

Where do I learn about security updates for NVIDIA products?

For information about NVIDIA Security Bulletins, see the Security Bulletin section of the PSIRT Policies page.

How do I report an email, website or pop-up window that falsely claims to represent NVIDIA?

Visit NVIDIA Support Website

How do I report the abuse or misuse of an NVIDIA product or service for malicious or illegal purposes?

Visit NVIDIA Support Website

How do I report software piracy (copying, selling, or use of software that hasn't been properly licensed)?

Visit NVIDIA Support Website

 *If reporting a potential vulnerability via email please encrypt using NVIDIA’s public PGP key (see PGP Key page) and include the following information:

  1. Product/Driver name and version/branch that contains the vulnerability
  2. Type of vulnerability (XSS, buffer overflow, etc.)
  3. Instructions to reproduce the vulnerability
  4. Proof-of-concept or exploit code
  5. Potential impact of the vulnerability, including how an attacker could exploit the vulnerability

NVIDIA PSIRT – Vulnerability Management

The NVIDIA Product Security Incident Response Team (PSIRT) goal is to minimize customers’ risk associated with security vulnerabilities by providing timely information, guidance and remediation of vulnerabilities in our products. NVIDIA PSIRT is a global team that manages the receipt, investigation, internal coordination, remediation and disclosure of security vulnerability information related to NVIDIA products.


One of the key responsibilities of NVIDIA’s PSIRT is to coordinate the response and disclosure for all externally identified NVIDIA product vulnerabilities.

Reporting Potential Security Vulnerability

NVIDIA welcomes reports from independent researchers, industry organizations, vendors, customers, and other sources concerned with product security.

To find out more information on how to report a potential vulnerability visit the Report Vulnerability page.

Coordinated Vulnerability Disclosure

NVIDIA strives to follow Coordinated Vulnerability Disclosure (CVD). CVD is a process by which independent reporters who discover a vulnerability in our product contact NVIDIA directly and allow us the opportunity to investigate and remediate the vulnerability before the reporter discloses the information to the public.

NVIDIA PSIRT will coordinate with the reporter throughout the vulnerability investigation and will provide the reporter with updates on progress as appropriate. With the agreement of the reporter, NVIDIA PSIRT may recognize the reporter on our Acknowledgement page for finding a valid product vulnerability and privately reporting the issue. After customers are protected, the reporter is welcome to discuss the vulnerability publicly.

Following NVIDIA’s CVD allows us to protect our customers and at the same time, coordinate public disclosures and appropriately acknowledge the reporter(s) for their finding.

If a reported vulnerability involves a vendor product, the NVIDIA PSIRT will notify the vendor directly, coordinate with the reporter, or engage a third-party coordination center.

Subscribing to Security Bulletins and Updates

The list of published Security Bulletins can be found on the NVIDIA Security Bulletins page.

Customers are strongly advised to subscribe to NVIDIA Security Bulletins notifications to stay informed of initial release or major revisions to NVIDIA Security Bulletins.

You can subscribe to notifications here.

For information about NVIDIA Security Bulletins, see the Security Bulletin section of this document.

Media or PR Inquiries Regarding NVIDIA Security Vulnerability Information

Please reach out to one of the Corporate Communication contacts listed here.

NVIDIA PSIRT Vulnerability Management Process

The following graphic illustrates the NVIDIA PSIRT process at a high level.

Figure 1. NVIDIA Product Security Incident Response Team Process

policies-image-400

Assessing Security Risk using Common Vulnerability Scoring System (CVSS)

NVIDIA currently uses the Common Vulnerability Scoring System version 3.0 (CVSS v3.0) to evaluate the severity level of identified vulnerabilities. CVSS enables a common scoring method and a common language to communicate the characteristics and impacts of vulnerabilities. CVSS attempts to establish a measurement of how much concern a vulnerability warrants. The CVSS model uses three distinct measurements or scores that include Base, Temporal, and Environmental calculations, each consisting of a set of metrics. The full standard, which is maintained by the Forum of Incident Response and Security Teams (FIRST), can be found at: https://www.first.org/cvss .

NVIDIA follows CVSS v3.0 Specification Document Qualitative Severity Rating Scale (https://www.first.org/cvss/specification-document) to define Severity Ratings as shown in the table below:

Security Impact Rating CVSS Score
Critical 9.0 – 10.0
High 7.0 – 8.9
Medium 4.0 – 6.9
Low .1 – 3.9
None 0.0

NVIDIA reserves the right to deviate from these guidelines in specific cases if additional factors are not properly captured in the CVSS score.

When and where applicable, NVIDIA Security Bulletins will provide the CVSS v3.0 Base Score, and potentially the Temporal Score. NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation.

NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration and encourages you to compute the Environmental score based on your network parameters. NVIDIA recommends that all customers take into account the Base Score and any Temporal and/or Environmental Scores that may be relevant to their environment to assess their overall risk. This overall score represents a moment in time and is tailored to your specific environment. You should use a security or IT professional’s assessment of the issue and this final score to prioritize responses in your own environment.

Vulnerability Communication Policy

NVIDIA uses the following guidelines for non-third-party software vulnerabilities to determine the appropriate Communication Plan:

Security Impact Rating CVSS Score Communication Plan
Critical 9.0–10.0 NVIDIA Security Bulletin
High 7.0–8.9
Medium 4.0–6.9
Low 3.9 or below Product Release Note

If there is a security issue with a third-party software component that is used in an NVIDIA product, NVIDIA may publish a Security Bulletin. If a Security Bulletin is published for a third-party software component vulnerability, then NVIDIA typically uses the CVSS score provided by the component creator. In some cases, NVIDIA may adjust the CVSS score to reflect the impact to the NVIDIA product.

NVIDIA reserves the right to deviate from these guidelines in specific cases if additional factors are not properly captured in the CVSS score.

Security Bulletins

In most cases, NVIDIA intends to notify customers when there is an identified practical workaround or fix for a security vulnerability. The notification is through either targeted communications or by posting a Security Bulletin to the Security Bulletin page. If a Security Bulletin is posted the Security Bulletin will be posted after NVIDIA PSIRT has completed the vulnerability response process and determined that sufficient software patches or workarounds exist to address the vulnerability, or subsequent public disclosure of code fixes is planned to address the vulnerabilities.

Security Bulletins attempt to balance the right amount of information by providing sufficient details so that customers can protect themselves, but not verbose details allowing malicious users to take advantage of the information. NVIDIA Security Bulletins will typically include the following information where applicable:

  1. Products and versions affected
  2. Common Vulnerability Enumeration (CVE) identifier for the vulnerability (see http://cve.mitre.org)
  3. Brief description of the vulnerability and potential impact if exploited
  4. The Common Vulnerability Scoring System (CVSS) severity rating for the vulnerability (see http://www.first.org/cvss/cvss-guide.html)
  5. Remedy details such as an upgrade, fix, mitigation or other customer action
  6. Credit to the reporter of the identified vulnerability and acknowledgment for working with NVIDIA on the Coordinated Vulnerability Disclosure

NVIDIA will not provide additional information about the specifics of vulnerabilities beyond what is provided in the Security Bulletin and related documentation such as release notes, knowledge base articles, FAQs, etc. NVIDIA does not distribute exploit/proof of concept code for identified vulnerabilities.

In accordance with industry practices, NVIDIA does not share the findings from internal security testing or other types of security activities with external entities. It is important to note that any scan of NVIDIA’s Security production systems will be considered an attack. If you are an OEM partner, please coordinate your needs with your NVIDIA program manager.


NVIDIA Security Bulletins are posted on the Security Bulletin page.  You can subscribe to notifications here.

 

Security Notice

NVIDIA may release a special communication to respond quickly and appropriately to public disclosures where the vulnerability may have received significant public attention, is likely to have exploits available, or is expected to be actively exploited. In such an event, NVIDIA may expedite the communication and may or may not include a complete set of patches or workarounds.  This will be labeled as a Security Notice and posted on the Security Bulletin page.

Vulnerability Remediation

NVIDIA takes security concerns seriously and works to evaluate and address them in a timely manner. Response timelines will depend on many factors, including: the severity, the product affected, the current development cycle, QA cycles, and whether the issue can only be updated in a major release. 

Remediation may take one or more of the following forms:

  1. A new release
  2. An NVIDIA-provided patch
  3. Instructions to download and install an update or patch from a third-party
  4. A workaround to mitigate the vulnerability

Customer Rights: Warranties, Support, and Maintenance

NVIDIA customers’ rights with respect to warranties and support and maintenance, including vulnerabilities, in any NVIDIA software product are governed by the applicable agreement between NVIDIA and each customer.

The statements on this web page do not modify or expand any customer rights or create any additional warranties. Any information provided to NVIDIA regarding vulnerabilities in NVIDIA products including all information in a product vulnerability report shall become the sole information of NVIDIA.

Disclaimer

All aspects of NVIDIA’s PSIRT process and policies are subject to change without notice and on a case-by-case basis. Response is not guaranteed for any specific issue or class of issues. Your use of the information on the document or materials linked from the document is at your own risk. NVIDIA reserves the right to change or update this document without notice at any time.

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information is believed to be accurate and reliable at the time it is furnished. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

NVIDIA encourages Coordinated Vulnerability Disclosure of security vulnerabilities through the Security Vulnerability Submission Form.

NVIDIA thanks the following individuals and organizations for their contribution towards making our products more secure.

2017
Security Bulletin ID CVE(s) Acknowledgement
4561 CVE-2017-0306
CVE-2016-6915
CVE-2016-6916
CVE-2016-6917
Nathan Crandall, Tesla Motors Product Security Team
4560 CVE-2017-0316 Tim Harrison
4544 CVE-2017-6269
CVE-2017-6270
CVE-2017-6271
Enrique Nissim, IOActive
4525 CVE-2017-6256 Enrique Nissim, IOActive
4525 CVE-2017-6259 Andrei Lascu and Alastair Donaldson, Multicore Programming Group at Imperial College London
4398 CVE-2017-0312
CVE-2017-0313
Oliver Chang, Google Project Zero
4398 CVE-2017-0317 Ryan Whitworth
N/A N/A Kushal Arvind Shah, Fortinet's FortiGuard Labs
N/A N/A Tim Harrison

2016

2015

2014

2013

NVIDIA Public PGP Key for communication.

-----BEGIN PGP PUBLIC KEY BLOCK-----

Version: PGP Universal 3.4.2 (Build 289)

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=aOdk
-----END PGP PUBLIC KEY BLOCK-----