Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE‑2018‑6263 CVE‑2018‑6265 CVE‑2018‑6266 |
CWE-ID | CWE-427 CWE-264 CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
GeForce Experience Client/Desktop applications / Other client software |
Vendor | nVidia |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU15999
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE‑2018‑6263
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to insecure .dll loading mechanism when opening files. A local attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 3.16.
Vulnerable software versionsGeForce Experience: 3.0 - 3.15
CPE2.3https://nvidia.custhelp.com/app/answers/detail/a_id/4740
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16000
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE‑2018‑6265
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to an error during application installation on Windows 7 in elevated privilege mode. A local attacker can initiate a browser session and gain elevated privileges to execute arbitrary code.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 3.16.
Vulnerable software versionsGeForce Experience: 3.0 - 3.15
CPE2.3https://nvidia.custhelp.com/app/answers/detail/a_id/4740
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16001
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE‑2018‑6266
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due information exposure. A local attacker can obtain third party integration parameters and access arbitrary data.
MitigationUpdate to version 3.16.
Vulnerable software versionsGeForce Experience: 3.0 - 3.15
CPE2.3https://nvidia.custhelp.com/app/answers/detail/a_id/4740
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.