Code Execution Flaws Haunt NVIDIA ChatRTX for Windows

Code Execution Flaws Haunt NVIDIA ChatRTX for Windows

March 27, 2024 at 03:00PM

NVIDIA issued urgent patches for two high-risk vulnerabilities in its ChatRTX for Windows app, which could lead to code execution and data tampering attacks. The flaws, with severity scores of 8.2/10 and 6.5/10, impact versions 0.2 and earlier. The app is used for connecting PC LLMs to data using retrieval-augmented generation.

From the meeting notes, the key takeaways are as follows:

– NVIDIA has issued urgent patches for two software flaws in its ChatRTX for Windows app that could lead to code execution and data tampering attacks.
– The flaws carry a ‘high-risk’ rating and are identified as CVE‑2024‑0082 and CVE-2024-0083. These vulnerabilities affect ChatRTX for Windows 0.2 and prior versions.
– CVE‑2024‑0082 pertains to a vulnerability in the UI of ChatRTX for Windows, where an attacker could exploit improper privilege management by sending open file requests to the application. This could result in local escalation of privileges, information disclosure, and data tampering. The severity score is 8.2/10.
– CVE-2024-0083 relates to a vulnerability in the UI, enabling an attacker to cause a cross-site scripting error by running malicious scripts in users’ browsers. Exploiting this vulnerability could lead to code execution, denial of service, and information disclosure. The severity score is 6.5/10.
– The NVIDIA ChatRTX app is utilized by developers and AI enthusiasts for connecting PC LLMs to their data using retrieval-augmented generation (RAG) technique.

In addition, relevant articles and information regarding similar security-related developments within the industry were included in the meeting notes.

Is there anything else you would like to add or clarify from the meeting notes?

Full Article