Description

Cisco Talos has uncovered a flaw in the shader functionality of the NVIDIA D3D10 driver, which is used alongside NVIDIA graphics cards. If an attacker provides a specifically constructed shader packer, the driver is susceptible to memory corruption, which might give rise to a memory corruption problem. The severity rating for the flaw tracked as CVE-2022-34671 is 8.5 out of 10. An attacker might use the vulnerability to accomplish a guest-to-host escape from guest computers running virtualization frameworks (like VMware, QEMU, and VirtualBox). According to Talos' study, these vulnerability might potentially be exploited via a web browser employing WebGL and WebAssembly. Our investigation team used the RemoteFX functionality to trigger the flaw from a HYPER-V guest, resulting in the execution of susceptible code on the HYPER-V host (within the rdvgm.exe process). Microsoft has discontinued RemoteFX lately; however, older workstations may still use it. Moreover, Talos collaborated with NVIDIA to patch these vulnerability and make an update accessible to impacted users, all in accordance with Cisco’s vulnerability reporting policy.