On November 26, 2024, NVIDIA disclosed a high-severity vulnerability affecting its UFM Enterprise, UFM Appliance, and UFM CyberAI products. Identified as CVE-2024-0130, this flaw could allow attackers to escalate privileges, manipulate data, cause service disruptions, and access sensitive information. The vulnerability stems from an improper authentication mechanism and has been assigned a CVSS v3.1 base score of 8.8, indicating a critical risk level.
Attackers can exploit this vulnerability by sending malformed requests through the Ethernet management interface of affected UFM systems. NVIDIA confirmed that a successful exploit could result in privilege escalation, data tampering, denial of service, and information disclosure. However, the management interface is typically isolated from public networks, which limits the exploitation risk.
The vulnerability impacts multiple versions of the UFM product line. NVIDIA has released updates to address the issue and strongly advises users to immediately apply these patches. While the LTS22 versions of UFM are unaffected, security updates for other versions are available on the NVIDIA Enterprise Support Portal.
This type of vulnerability underscores the critical importance of timely updates, especially for tools managing infrastructure. Since systems like UFM often have privileged access to network resources, a vulnerability could lead to severe consequences if exploited by attackers.
Organizations using NVIDIA UFM products should urgently implement the security updates and review their network configurations to ensure that management interfaces are properly isolated from untrusted networks. This step is essential to strengthen defenses against potential attacks.