Critical flaw in NVIDIA Container Toolkit allows full host takeover

Teilen:

A critical vulnerability in NVIDIA Container Toolkit impacts all AI applications in a cloud or on-premise environment that rely on it to access GPU resources.

The security issue is tracked as CVE-2024-0132 and allows an adversary to perform container escape attacks and gain full access to the host system, where they could execute commands or exfiltrate sensitive information.

The particular library comes pre-installed in many AI-focused platforms and virtual machine images and is the standard tool for GPU access when NVIDIA hardware is involved.

According to Wiz Research, more than 35% of cloud environments are at risk of attacks exploiting the vulnerability

Container escape flaw

The security issue CVE-2024-0132 received a critical-severity score of 9.0. It is a container escape problem that affects NVIDIA Container Toolkit 1.16.1 and earlier, and GPU Operator 24.6.1 and older.

The problem is a lack of secure isolation of the containerized GPU from the host, allowing containers to mount sensitive parts of the host filesystem or access runtime resources like Unix sockets for inter-process communication.

While most filesystems are mounted with “read-only” permissions, certain Unix sockets such as ‘docker.sock’ and ‘containerd.sock’ remain writable, allowing direct interactions with the host, including command execution.

An attacker can take advantage of this omission via a specially crafted container image and reach the host when executed.

Wiz says that such an attack could be carried out either directly, via shared GPU resources, or indirectly, when the target runs an image downloaded from a bad source.

Wiz researchers discovered the vulnerability and reported it to NVIDIA on September 1st. The GPU maker acknowledged the report a couple of days later, and released a fix on September 26th.

Impacted users are recommended to upgrade to NVIDIA Container Toolkit version 1.16.2 and NVIDIA GPU Operator 24.6.2.

Technical details for the exploiting the security issue remain private for now, to give impacted organizations time to mitigate the issue in their environments. However, the researchers are planning to release more technical information.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:08 am, Juni 24, 2025
Wetter-Symbol 17°C
L: 16° | H: 18°
overcast clouds
Luftfeuchtigkeit: 83 %
Druck: 1012 mb
Wind: 10 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
16° | 18°°C 0 mm 0% 14 mph 83 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 8 mph 87 % 1013 mb 0 mm/h
Do. Juni 26 10:00 pm
Wetter-Symbol
17° | 23°°C 0.97 mm 97% 14 mph 88 % 1017 mb 0 mm/h
Fr. Juni 27 10:00 pm
Wetter-Symbol
15° | 27°°C 0 mm 0% 15 mph 67 % 1021 mb 0 mm/h
Sa. Juni 28 10:00 pm
Wetter-Symbol
17° | 26°°C 0 mm 0% 9 mph 81 % 1024 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 12 mph 83 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
17° | 19°°C 0 mm 0% 13 mph 80 % 1012 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
21° | 24°°C 0 mm 0% 14 mph 62 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 13 mph 50 % 1011 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 10 mph 67 % 1012 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 8 mph 79 % 1012 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 6 mph 87 % 1012 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 81 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€90,720.21
3.16%
Ethereum(ETH)
€2,070.53
6.25%
Fesseln(USDT)
€0.86
0.04%
XRP(XRP)
€1.88
7.92%
Solana(SOL)
€124.80
7.67%
USDC(USDC)
€0.86
0.01%
Dogecoin(DOGE)
€0.140780
6.11%
Shiba Inu(SHIB)
€0.000010
8.38%
Pepe(PEPE)
€0.000009
12.10%
Nach oben scrollen