CVE-2024-0134
NVIDIA Container Toolkit vulnerability analysis and mitigation

Overview

NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability (CVE-2024-0134) where a specially crafted container image can lead to the creation of unauthorized files on the host. The vulnerability was discovered and reported by researchers from Wiz Research (Andres Riancho, Ronen Shustin, and Shir Tamari) and was publicly disclosed on November 5, 2024. The affected versions include NVIDIA Container Toolkit up to and including v1.16.2 and NVIDIA GPU Operator up to and including version 24.6.2 (NVIDIA Bulletin).

Technical details

The vulnerability is classified as a UNIX Symbolic Link (Symlink) Following issue (CWE-61) with a CVSS v3.1 base score of 4.1 (Medium severity). The attack vector is Network-based (AV:N) with Low attack complexity (AC:L), requiring Low privileges (PR:L) and User interaction (UI:R). The scope is Changed (S:C), with No impact on confidentiality (C:N), Low impact on integrity (I:L), and No impact on availability (A:N). The complete CVSS vector is AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N (NVIDIA Bulletin, Red Hat CVE).

Impact

A successful exploitation of this vulnerability might lead to data tampering through the creation of unauthorized files on the host system. Notably, an attacker cannot control the name and location of the files that are created, which somewhat limits the potential impact (NVIDIA Bulletin).

Mitigation and workarounds

NVIDIA has released security updates to address this vulnerability. Users should upgrade to NVIDIA Container Toolkit v1.17 or NVIDIA GPU Operator 24.9.0 or later versions. The update can be installed following the installation section of the NVIDIA Container Toolkit documentation and the NVIDIA GPU Operator documentation (NVIDIA Bulletin).

Additional resources


SourceThis report was generated using AI

Related NVIDIA Container Toolkit vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-23266CRITICAL9
  • Rocky LinuxRocky Linux
  • toolbox
NoYesJul 17, 2025
CVE-2025-23267HIGH8.5
  • NVIDIA Container ToolkitNVIDIA Container Toolkit
  • github.com/nvidia/gpu-operator
NoYesJul 17, 2025
CVE-2025-22874HIGH7.5
  • DockerDocker
  • node-feature-discovery-0.17
NoYesJun 11, 2025
CVE-2025-47907HIGH7
  • cAdvisorcAdvisor
  • amazon-ssm-agent
NoYesAug 07, 2025
CVE-2025-4673MEDIUM6.8
  • DockerDocker
  • containers-common
NoYesJun 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management