1 min read

NVIDIA Patches High-severity Vulnerability that Allowed for Spoofing Attacks via GeForce Experience

Silviu STAHIE

June 29, 2021

Promo Protect all your devices, without slowing them down.
Free 30-day trial
NVIDIA Patches High-severity Vulnerability that Allowed for Spoofing Attacks via GeForce Experience

NVIDIA patched a GeForce Experience high-severity vulnerability that would have allowed attackers to perform spoofing attacks, leading to the compromise of the user’s login token.

NVIDIA offers an application named GeForce Experience to their GPU users, letting them easily install the latest drivers, change game settings to better fit the PC’s performance, record video, stream and more. The application also requires users to log in for various perks.

It turns out that the application also had a high-severity vulnerability, which the company was quick to fix. Since a remote non-authenticated attacker can exploit the vulnerability via the Internet, it’s a big problem. But the fact that it still required some input from the user, like clicking on a link, kept the severity score to only 8.3.

“NVIDIA GeForce Experience software contains a vulnerability where, if a user clicks on a maliciously formatted link that opens the GeForce Experience login page in a new browser tab instead of the GeForce Experience application and enters their login information, the malicious site can get access to the token of the user login session,” said the company. “Such an attack may lead to these targeted users’ data being accessed, altered, or lost.”

The company explained that the vulnerability was only possible because the application incorrectly parsed specially formatted links.

“A remote attacker can create a specially crafted link that opens the GeForce Experience login page in a new browser tab instead of the GeForce Experience application and enters their login information, the malicious site can get access to the token of the user login session” they added.

Installing the latest version of the application fixes this exploit. It should not be a problem since the update is directly pushed to users who have the app installed, and it’s installed when the app is opened.

tags


Author


Silviu STAHIE

Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.

View all posts

You might also like

Bookmarks


loader