Security flaws found in all Nvidia GeForce GPUs. Update drivers ASAP!

Security flaws found in all Nvidia GeForce GPUs. Update drivers ASAP!
Nvidia Konfig ThumbImage: Nvidia

Graphics card manufacturer Nvidia is currently issuing a warning to all owners of GeForce GPUs. According to an Nvidia security bulletin, several security vulnerabilities requiring urgent attention have been discovered in the company’s own display drivers and other software.

A total of eight vulnerabilities are listed, all of them with a “High” severity rating. If you have an Nvidia GeForce GPU, you need to act now.

The scope of the security flaws

According to Nvidia, it’s possible for attackers to gain access to your entire system by exploiting one of the vulnerabilities. With this kind of access, hackers can not only infiltrate and execute malicious code in your PC, but also read and steal personal data.

The vulnerabilities affect GeForce software, Nvidia RTX, Quadro, NVS, and Tesla, both under Windows and Linux.

Nvidia hasn’t explicitly said whether any of these vulnerabilities are already being exploited in the wild. However, as all GeForce graphics cards are affected, it’s probably a far-reaching problem.

Urgent steps for GeForce users

To address these security vulnerabilities, you’ll need the latest Nvidia GeForce drivers with version 566.03 for Windows and versions 565.57.01, 550.127.05, and 535.216.01 for Linux. Nvidia also points out that some distributors also supply the necessary security updates as versions 565.92, 561.03, 556.35, and 553.05.

For Nvidia RTX, Quadro, and NVS, update versions 566.03, 553.24, and 538.95 will address the security issues.

You can search for the appropriate updates using Nvidia’s Manual Driver Search tool and download them directly. The latest drivers are also offered in the Nvidia App and GeForce Experience app.

Further reading: Important Nvidia App tweaks for GeForce gamers

This article originally appeared on our sister publication PC-WELT and was translated and localized from German.

admin

Leave a Reply

Your email address will not be published. Required fields are marked *