{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T11:32:28.575","vulnerabilities":[{"cve":{"id":"CVE-2021-1099","sourceIdentifier":"psirt@nvidia.com","published":"2021-07-21T03:15:07.053","lastModified":"2024-11-21T05:43:35.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."},{"lang":"es","value":"El software NVIDIA vGPU contiene una vulnerabilidad en el Virtual GPU Manager (vGPU plugin) que podría permitir a un atacante causar un desbordamiento de búfer en la región stack de la memoria y poner un gadget ROP personalizado en la pila. Un ataque de este tipo podría conllevar a una divulgación de información, manipulación de datos o denegación de servicio. Esto afecta a las versiones 12.x de vGPU (anteriores a 12.3), versiones 11.x (anteriores a 11.5) y versiones 8.x (anteriores a 8.8)"}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndExcluding":"8.8","matchCriteriaId":"162224F1-1D4D-418C-8039-96EE094F6904"},{"vulnerable":true,"criteria":"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.5","matchCriteriaId":"F0467257-8AD1-4004-99F1-47C52400099D"},{"vulnerable":true,"criteria":"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.3","matchCriteriaId":"0D7337F7-ECD9-4DFA-83E3-B679479691B6"}]}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5211","source":"psirt@nvidia.com","tags":["Patch","Vendor Advisory"]},{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5211","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}