GeForce Experience, Nvidia releases security patch fixing new vulnerability in GeForce Experience,

Nvidia releases security patch fixing new vulnerability in GeForce Experience

Nvidia has just released a new security patch against a vulnerability in Windows, specifically with the application GeForce Experience. The manufacturer made the announcement on its official website.

Through an official release, Nvidia reported a new update for Windows GeForce Experience, according to the manufacturer, this bug left a vulnerability for DoS (Denial of Service) attacks or even the decision to use administrator privileges.

The flaw, identified as CVE-2019-5702, would allow to bypass operating system security levels and extend privileges that would allow access to all operating system privileges. This could violate the entire operating system and even bypass the security patches implemented in Windows.

The vulnerability known as GameStream could allow forced deletion of files from the system and corruption of important files. This has been categorized as high severity as it could lead to a denial of service or escalation of privileges. 8.4 AV: L/AC:L / PR:L/UI:N /S:C/C:N/I:H/A:H

NVIDIA states that the “Risk Assessment is based on an average risk for a large number of installed systems and may not represent the actual risk of your local installation. It goes on to warn that this bug affects Nvidia GeForce Experience versions less than 3.20.2, so it suggests users upgrade immediately.

If you are an Nvidia GeForce Experience user, you must upgrade as soon as possible and download the latest version from the link below. In addition, the manufacturer suggests that you perform the upgrade automatically from within the GFE application.

In August 2019, Nvidia released five security patches for its GeForce, Quadro, NVS and Tesla graphics cards, whose vulnerabilities could also cause DoS, privilege escalation and Windows 7 and 10 attacks.

Three of these vulnerabilities were rated as high risk and it was also recommended that they are updated as soon as possible.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *