393
VMScore

CVE-2019-5702

Published: 24/12/2019 Updated: 24/08/2020
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 393
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

NVIDIA GeForce Experience, all versions before 3.20.2, contains a vulnerability when GameStream is enabled in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nvidia geforce_experience

Github Repositories

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine.

NVIDIA Vulnerability Scanner for Local Machine Description: Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine CVEs: CVE‑2019‑5702 and previous Considerations: Run the script with the Unrestricted or Bypass execution policies Usage: PS E:\Pruebas C# PowerShell> \DetectNVIDIAVulnLocalps

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows domain.

NVIDIA Vulnerability Scanner for Domain Description: Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows domain CVEs: CVE‑2019‑5702 and previous Considerations: Well configured WinRM on remote machines Well configured firewall rules Allow ping to remote machines from the Domain Controller Run the script with