{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T01:09:26.569","vulnerabilities":[{"cve":{"id":"CVE-2021-34398","sourceIdentifier":"psirt@nvidia.com","published":"2021-08-13T16:15:07.540","lastModified":"2024-11-21T06:10:18.970","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA DCGM, all versions prior to 2.2.9, contains a vulnerability in the DIAG module where any user can inject shared libraries into the DCGM server, which is usually running as root, which may lead to privilege escalation, total loss of confidentiality and integrity, and complete denial of service."},{"lang":"es","value":"NVIDIA DCGM, en todas las versiones anteriores a la versión 2.2.9, contiene una vulnerabilidad en el módulo DIAG por la que cualquier usuario puede inyectar bibliotecas compartidas en el servidor DCGM, que normalmente es ejecutado como root, que puede conllevar a una escalada de privilegios, la pérdida total de la confidencialidad e integridad y la denegación completa del servicio."}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-829"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nvidia:data_center_gpu_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.9","matchCriteriaId":"D7E9EF4D-41D4-4B81-9E96-B46C9A834A1B"}]}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5219","source":"psirt@nvidia.com","tags":["Vendor Advisory"]},{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5219","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}