Explore worldwide content with a Secure, Private, Fast, and Free VPN in 1-click.
Download Now >

Expert in

PC Health Solution

Home > Press > Knowledge

Update the Drivers to Fix NIVIDIA's Five Vulnerabilities Right Away

Recently 5 security vulnerabilities have been found in the NVIDIA GeForce, NVS, Quadro and Tesla graphics processing unit (GPU) display drivers for Windows.

db.png

According to Forbes’s editor, Davey Winder: “Three of these are rated as high severity and unless updated could enable a denial of service attack as well as the escalation of privileges to enable an attacker to execute malware on your Windows computer.

If all of this sounds familiar, that's because it is: in May, Forbes reported how three vulnerabilities in NVIDIA GeForce, Quadro, and Tesla graphics cards had been found and patched. They too had the ability to lead to denial of service and privilege escalation exploits.

In this latest security disclosure, NVIDIA urges users to download and install the available software updates through the NVIDIA driver download pages.

All of the vulnerabilities impact Windows systems, including Windows 7, Windows 8, Windows 8.1 and Windows 10. The highest severity vulnerability is in the user mode video driver trace logger component of the Windows GPU display driver. This could, if a threat actor has access to the system, enable a ‘hard link attack’ leading to code execution, privilege escalation and denial of service…”.

Regarding NIVIDA graphics drivers exist high severity vulnerabilities, Driver Booster 6 Free covers 2,500,000+ drivers database of which support the latest NVIDIA GeForce, NVS, Quadro and Tesla graphics processing unit (GPU) display drivers for Windows. If you still don’t have one, download from:

free download.png


You may also want to learn:

1. How to uninstall problematic Nvidia graphics drivers on Windows?




Update Now

No, next time.

IObit uses cookies to improve content and ensure you get the best experience on our website.
Continue to browse our website agreeing to our privacy policy.

I Accept