7.8
CVSSv3

CVE-2019-5702

Published: 24/12/2019 Updated: 24/08/2020
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 393
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

NVIDIA GeForce Experience, all versions before 3.20.2, contains a vulnerability when GameStream is enabled in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nvidia geforce_experience

Github Repositories

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows domain.

NVIDIA Vulnerability Scanner for Domain Description: Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows domain CVEs: CVE‑2019‑5702 and previous Considerations: Well configured WinRM on remote machines Well configured firewall rules Allow ping to remote machines from the Domain Controller Run the script with

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine.

NVIDIA Vulnerability Scanner for Local Machine Description: Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine CVEs: CVE‑2019‑5702 and previous Considerations: Run the script with the Unrestricted or Bypass execution policies Usage: PS E:\Pruebas C# PowerShell> \DetectNVIDIAVulnLocalps