Description

NVIDIA issued critical patches for two vulnerabilities in its ChatRTX for Windows application, highlighting the risk of code execution and data tampering threats. These flaws, rated as 'high-risk,' are identified as CVE-2024-0082 and CVE-2024-0083, affecting ChatRTX for Windows 0.2 and earlier versions. The vulnerabilities could be exploited through cross-site-scripting attacks, potentially allowing attackers to execute harmful code and manipulate data. The first vulnerability, CVE-2024-0082, involves improper privilege management in the application's user interface (UI) when handling open file requests. An attacker could exploit this flaw to escalate local privileges, disclose sensitive information, and tamper with data. Its severity is rated at 8.2 out of 10 on the CVSS scale, signifying a significant risk. The second vulnerability, CVE-2024-0083, also in the UI of ChatRTX for Windows, enables a cross-site scripting error that allows attackers to run malicious scripts in users' browsers over the network. This could lead to code execution, denial of service, and information disclosure, with a CVSS severity score of 6.5/10. The ChatRTX app, utilized by developers and AI enthusiasts, facilitates connecting PC LLMs to their data using retrieval-augmented generation (RAG) techniques, making these vulnerabilities particularly concerning for users reliant on the application's functionality and security.