{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T08:06:34.123","vulnerabilities":[{"cve":{"id":"CVE-2023-31029","sourceIdentifier":"psirt@nvidia.com","published":"2024-01-12T19:15:09.847","lastModified":"2024-11-21T08:01:16.810","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA DGX A100 baseboard management controller (BMC) contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering."},{"lang":"es","value":"El controlador de administración de placa base (BMC) NVIDIA DGX A100 contiene una vulnerabilidad en el daemon KVM del host, donde un atacante no autenticado puede causar un desbordamiento de pila al enviar un paquete de red especialmente manipulado. Una explotación exitosa de esta vulnerabilidad puede provocar la ejecución de código arbitrario, denegación de servicio, divulgación de información y manipulación de datos."}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@nvidia.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:bmc:*:*:*","versionEndExcluding":"00.22.05","matchCriteriaId":"866DDFEC-0CB8-4152-B36E-A358497AA4D0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*","matchCriteriaId":"8807CB65-5F49-42E8-B5D8-36943418ADB9"}]}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5510","source":"psirt@nvidia.com","tags":["Vendor Advisory"]},{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5510","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}