{"vulnerability": "CVE-2024-0132", "sightings": [{"uuid": "9bfc027d-6b64-4169-89f9-ca8bbf2f3b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llf73zgty725", "content": "", "creation_timestamp": "2025-03-27T21:02:04.296049Z"}, {"uuid": "726070b4-9bd2-427a-ad68-b4171530ba5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/wizsecurity.bsky.social/post/3lhwcezst3c26", "content": "", "creation_timestamp": "2025-02-11T18:35:23.090171Z"}, {"uuid": "e573d09b-f5c3-46fc-9e4d-4c92a06dbccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/wizsecurity.bsky.social/post/3lhwcezsyws26", "content": "", "creation_timestamp": "2025-02-11T18:35:24.089886Z"}, {"uuid": "ef2aa487-5089-4c2a-878d-5cf65d5dbd16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/wizsecurity.bsky.social/post/3lhwcezszw226", "content": "", "creation_timestamp": "2025-02-11T18:35:25.091495Z"}, {"uuid": "b4206a3c-a239-419b-bbbb-ae9a99052287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113986946256894513", "content": "", "creation_timestamp": "2025-02-11T19:39:29.563516Z"}, {"uuid": "5a7bb051-a4cc-43f5-83c8-0ebb874e19b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/edera.dev/post/3lhyufayvsk2t", "content": "", "creation_timestamp": "2025-02-12T19:02:50.042490Z"}, {"uuid": "43f20cf8-ac70-46d6-b5f9-7caacbc981c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://threatintel.cc/2025/02/13/researchers-find-new-exploit-bypassing.html", "content": "", "creation_timestamp": "2025-02-13T12:16:18.000000Z"}, {"uuid": "b9f6c4cb-c848-467b-8011-56bf263f5ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lhyijxt6jo2u", "content": "", "creation_timestamp": "2025-02-12T15:30:43.404037Z"}, {"uuid": "17d6299d-2863-4d07-9052-1fd4cb1e78d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3li5hyh6v4323", "content": "", "creation_timestamp": "2025-02-14T15:04:14.614641Z"}, {"uuid": "4415898f-68d2-4fc2-9d92-837a659b142e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://infosec.exchange/users/andersonc0d3/statuses/114002872744958710", "content": "", "creation_timestamp": "2025-02-14T15:09:48.299836Z"}, {"uuid": "f5bd1a10-8b0e-4a22-92e9-486dc499248c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3li5icrcfnc2f", "content": "", "creation_timestamp": "2025-02-14T15:10:01.652746Z"}, {"uuid": "79ff1881-20c4-4e50-95c2-bdcbb6b4379e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lmh3ror44b2x", "content": "", "creation_timestamp": "2025-04-10T08:33:06.825996Z"}, {"uuid": "6532dcbe-8c4f-41cf-bfe3-bb6bb45aa5a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lifjg64ey72i", "content": "", "creation_timestamp": "2025-02-17T19:51:06.626919Z"}, {"uuid": "ce60510a-d81f-45df-ab40-2b61415ae45f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmhcckkxfc2s", "content": "", "creation_timestamp": "2025-04-10T10:29:55.250734Z"}, {"uuid": "78f9a13c-61a7-4d19-bbb8-b3f2049025d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lmkqbwi2622l", "content": "", "creation_timestamp": "2025-04-11T19:18:08.143070Z"}, {"uuid": "47468455-76b9-47ae-97ca-001a45bbcfcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lmhr3sworn2d", "content": "", "creation_timestamp": "2025-04-10T14:54:34.939175Z"}, {"uuid": "09041b40-edfa-4c55-98c8-9ebf8dcc4c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/OpenSource.activitypub.awakari.com.ap.brid.gy/post/3lmhrbviymix2", "content": "", "creation_timestamp": "2025-04-10T14:58:05.269942Z"}, {"uuid": "5825c845-9ff6-48e9-9739-e79b1c9b04bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3lmhrfnrzz32d", "content": "", "creation_timestamp": "2025-04-10T15:00:06.972825Z"}, {"uuid": "72e25771-b00b-4671-a4bd-2f79f46a24c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmhrgxg3ax2n", "content": "", "creation_timestamp": "2025-04-10T15:00:49.075975Z"}, {"uuid": "28dbc643-2725-44d6-8203-6d547ec74a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lmi32kwtyc2p", "content": "", "creation_timestamp": "2025-04-10T17:52:50.881768Z"}, {"uuid": "f76364c0-7417-490b-b93a-c959756748e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lmi3ljju722z", "content": "", "creation_timestamp": "2025-04-10T18:02:24.037228Z"}, {"uuid": "6c85a2d0-09a9-4f2e-a7a1-d2d14e842344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmlhf4lzyt2g", "content": "", "creation_timestamp": "2025-04-12T02:11:29.076952Z"}, {"uuid": "96480cff-6353-42a3-9fa1-00e737035963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/114326223496332573", "content": "", "creation_timestamp": "2025-04-12T17:42:09.737181Z"}, {"uuid": "18d42f53-5053-40d1-87c9-2ed6cb2e4651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html", "content": "", "creation_timestamp": "2025-04-10T12:13:00.000000Z"}, {"uuid": "d03e6e92-1724-4d23-a58d-2306d3989046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmimqilei7p2", "content": "", "creation_timestamp": "2025-04-10T23:10:32.469228Z"}, {"uuid": "f40817d9-af67-4bb5-8ecf-3d32ce668cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmiwyetynlp2", "content": "", "creation_timestamp": "2025-04-11T02:12:48.840795Z"}, {"uuid": "a644eb0f-0a91-49d6-907a-2ec29b25fdd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3lmjifcvvik2b", "content": "", "creation_timestamp": "2025-04-11T07:24:12.399796Z"}, {"uuid": "a022c1de-ed90-42e0-aa43-f5ce553ce5a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lmjj47j62s2k", "content": "", "creation_timestamp": "2025-04-11T07:37:12.659392Z"}, {"uuid": "2735879a-84f2-4d0f-997b-a7d155ec942c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmo3m2tjq7e2", "content": "", "creation_timestamp": "2025-04-13T03:18:47.021207Z"}, {"uuid": "67e8f5a6-ca54-4303-bb89-8433f6412739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmo6soy5bp2g", "content": "", "creation_timestamp": "2025-04-13T04:16:00.098068Z"}, {"uuid": "57bfcad7-e4b4-4b6b-87ac-7ce57a13d12a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lmoqyyywts26", "content": "", "creation_timestamp": "2025-04-13T09:41:44.086091Z"}, {"uuid": "ff4c6c69-4610-4a0a-adf5-c59aba3469a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/patrickcmiller.bsky.social/post/3lmnujwayuh26", "content": "", "creation_timestamp": "2025-04-13T01:12:08.228581Z"}, {"uuid": "02530f85-d431-42b9-ac28-cb428f0e9093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lmsqgwsqe72o", "content": "", "creation_timestamp": "2025-04-14T23:42:11.658780Z"}, {"uuid": "1f9e0bf8-94d4-48a6-b274-34beec9f58bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114318993583529498", "content": "", "creation_timestamp": "2025-04-11T11:03:30.347588Z"}, {"uuid": "3927dd91-93ce-4104-86c8-712a7f9e944c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114319180711058620", "content": "", "creation_timestamp": "2025-04-11T11:51:04.720002Z"}, {"uuid": "0ed5894d-38d3-4ce8-9807-6d3f709b7d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lmjxcszekc26", "content": "", "creation_timestamp": "2025-04-11T11:51:13.523693Z"}, {"uuid": "96c4ccc9-5063-4e45-b0fd-5ed05637fba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmk2dwes5c2x", "content": "", "creation_timestamp": "2025-04-11T12:45:30.406309Z"}, {"uuid": "3b688ea4-38f0-45e3-93f3-dd2619ba15a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxyuwif2t", "content": "", "creation_timestamp": "2025-04-15T21:02:19.973393Z"}, {"uuid": "463cac9a-3a59-4e5b-9edb-556c5b7003bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmtupfhsl42z", "content": "", "creation_timestamp": "2025-04-15T10:31:10.639741Z"}, {"uuid": "1f80cb8e-9b60-4bd5-8566-e3df70182d05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmqil5ansl2q", "content": "", "creation_timestamp": "2025-04-14T02:16:06.521939Z"}, {"uuid": "c2446a6a-4a97-43e0-8500-f4d7d34b8d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/tweekfawkes.bsky.social/post/3lndgrhuobq2q", "content": "", "creation_timestamp": "2025-04-21T15:04:23.509369Z"}, {"uuid": "87934e29-e7b8-47aa-a7c2-370ac8f4f2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogm4m2t", "content": "", "creation_timestamp": "2025-04-17T01:03:49.236517Z"}, {"uuid": "f3760963-1b8c-4039-b4e8-7cb4fadf9422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogsxe2t", "content": "", "creation_timestamp": "2025-04-17T01:03:52.429248Z"}, {"uuid": "f9472c63-7749-488e-a2ef-0e47eb7c0f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogtwm2t", "content": "", "creation_timestamp": "2025-04-17T01:03:55.551205Z"}, {"uuid": "8bc4912f-93f7-4321-a000-766d677a09af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogtwn2t", "content": "", "creation_timestamp": "2025-04-17T01:03:58.665670Z"}, {"uuid": "6f294bb2-bb57-4be0-8d93-38e9f9da43e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwoguvv2t", "content": "", "creation_timestamp": "2025-04-17T01:04:01.757295Z"}, {"uuid": "35cb59b6-edfd-40fd-9927-1f8af7602176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv52t", "content": "", "creation_timestamp": "2025-04-17T01:04:04.853519Z"}, {"uuid": "7a85f66e-4d48-4822-a429-dc3797431914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv62t", "content": "", "creation_timestamp": "2025-04-17T01:04:08.169181Z"}, {"uuid": "21fed649-d182-4ec5-a514-f0222bd09c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv72t", "content": "", "creation_timestamp": "2025-04-17T01:04:11.331941Z"}, {"uuid": "5e799a5c-42ae-422a-9bce-84cd6d8cc128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuh2t", "content": "", "creation_timestamp": "2025-04-17T01:04:14.580444Z"}, {"uuid": "34b2ad84-0e9b-46f3-b81f-da1aff3215b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwui2t", "content": "", "creation_timestamp": "2025-04-17T01:04:17.698564Z"}, {"uuid": "a7a9814a-c425-4f63-9cda-448d1127f51b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwul2t", "content": "", "creation_timestamp": "2025-04-17T01:04:27.207825Z"}, {"uuid": "dfc62964-de28-4271-83b6-79e2451b5665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuj2t", "content": "", "creation_timestamp": "2025-04-17T01:04:20.856058Z"}, {"uuid": "b8fbb8ee-2a0e-4aad-bf1b-7b11577dd515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuk2t", "content": "", "creation_timestamp": "2025-04-17T01:04:24.046403Z"}, {"uuid": "8b849921-91dd-452c-894e-6526a479215b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogxtt2t", "content": "", "creation_timestamp": "2025-04-17T01:04:30.646303Z"}, {"uuid": "788fa854-90d3-4909-94d2-12445a5430e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/kubesploit.io/post/3lygcocrmcy2v", "content": "", "creation_timestamp": "2025-09-09T18:06:09.257014Z"}, {"uuid": "9729f476-b6cd-4fc4-ad2d-b3389a47d1d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lntp6yc5vi2o", "content": "", "creation_timestamp": "2025-04-28T02:17:42.524897Z"}, {"uuid": "0c1a069d-bb12-4086-8523-77224bed4862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-67efc907-5d48de1d9f6b78a7", "content": "", "creation_timestamp": "2025-07-24T20:38:54.741389Z"}, {"uuid": "efc7cfd3-8dac-4687-a1b5-ef6a787a68e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:37.000000Z"}, {"uuid": "fef67211-8ea2-4f53-b082-d8dd4b937d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}, {"uuid": "fa0537cd-fe6e-4354-89e7-3be876837488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnr3oinbr226", "content": "", "creation_timestamp": "2025-04-27T01:23:15.400657Z"}, {"uuid": "7f0a258c-81d8-4407-839f-989b43d803b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnr3xgx5h226", "content": "", "creation_timestamp": "2025-04-27T01:28:13.760612Z"}, {"uuid": "2f7d2466-8e51-4290-a9aa-d8d8114a4dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnr3yz3s3c26", "content": "", "creation_timestamp": "2025-04-27T01:29:06.633900Z"}, {"uuid": "8c3542ba-b585-4c1d-9691-cd4c18b8dbd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lqpze3d3ii2n", "content": "", "creation_timestamp": "2025-06-03T19:24:26.335155Z"}, {"uuid": "bc3c5686-081c-4a98-bfae-3c38ccf5e652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lqpzeyadsm25", "content": "", "creation_timestamp": "2025-06-03T19:24:56.692161Z"}, {"uuid": "75be233a-01d3-473a-83bb-1a8887ae19a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2538", "content": "How Wiz found a Critical NVIDIA AI vulnerability:\u202f Deep Dive into a container escape (CVE-2024-0132)\n\nhttps://www.wiz.io/blog/nvidia-ai-vulnerability-deep-dive-cve-2024-0132", "creation_timestamp": "2025-02-13T06:21:17.000000Z"}, {"uuid": "11414ae2-0daa-49b5-bd1b-06e7816e7663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/hillelwayne.com/post/3mhbewrynok2d", "content": "", "creation_timestamp": "2026-03-17T16:21:17.978940Z"}, {"uuid": "a6976d56-8b02-401d-84bd-47536b0dd7fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://bsky.app/profile/hillelwayne.com/post/3mhbewseilk2d", "content": "", "creation_timestamp": "2026-03-17T16:21:18.508115Z"}, {"uuid": "a7ee1490-40b6-41e5-a634-89e53bcf1349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/1376", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \u2013 thehackernews.com\n\nThu, 10 Apr 2025 22:13:00", "creation_timestamp": "2025-04-10T16:03:33.000000Z"}, {"uuid": "2f4545d7-a0ec-4161-9f9d-92ccf7a74ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/itsec_news/5391", "content": "\u200b\u26a1\ufe0fCVE-2025-23359: \u043d\u043e\u0432\u0430\u044f \u043b\u0430\u0437\u0435\u0439\u043a\u0430 \u0432 \u0441\u043e\u0444\u0442\u0435 Nvidia \u043f\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u043f\u043e\u0434 \u0443\u0434\u0430\u0440\n\n\ud83d\udcac \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 NVIDIA Container Toolkit, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u044e \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0445\u043e\u0441\u0442\u0443. \u041d\u043e\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-23359 \u0438 \u043e\u0446\u0435\u043d\u043a\u0443 8.3 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432:\n\nNVIDIA Container Toolkit \u2014 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 1.17.3 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 1.17.4)\nNVIDIA GPU Operator \u2014 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 24.9.1 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 24.9.2)\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f NVIDIA \u0432 \u0441\u0432\u043e\u0451\u043c \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0438 \u0443\u043a\u0430\u0437\u0430\u043b\u0430, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e TOCTOU (Time-of-Check to Time-of-Use). \u0412 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0445\u043e\u0441\u0442\u0430. \u042d\u0442\u043e \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043e\u0442\u043a\u0430\u0437\u0430 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0439 \u0441 \u0434\u0430\u043d\u043d\u044b\u043c\u0438.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Wiz, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u044e\u0449\u0430\u044f\u0441\u044f \u043d\u0430 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 . \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e CVE-2025-23359 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u0440\u0430\u043d\u0435\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-0132 (CVSS: 9.0), \u0437\u0430\u043a\u0440\u044b\u0442\u043e\u0439 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430.\n\n\u0412 \u0445\u043e\u0434\u0435 \u0430\u0442\u0430\u043a\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0441\u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u043e\u0440\u043d\u0435\u0432\u0443\u044e \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0445\u043e\u0441\u0442\u0430 \u0432\u043d\u0443\u0442\u0440\u044c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432 \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u043c. \u041f\u043e\u043c\u0438\u043c\u043e \u044d\u0442\u043e\u0433\u043e, \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b \u0447\u0435\u0440\u0435\u0437 Unix-\u0441\u043e\u043a\u0435\u0442\u044b, \u0447\u0442\u043e \u0432\u0435\u0434\u0451\u0442 \u043a \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0445\u043e\u0441\u0442\u0430.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wiz \u0428\u0438\u0440 \u0422\u0430\u043c\u0430\u0440\u0438, \u0420\u043e\u043d\u0435\u043d \u0428\u0443\u0441\u0442\u0438\u043d \u0438 \u0410\u043d\u0434\u0440\u0435\u0441 \u0420\u0438\u0430\u043d\u0447\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 NVIDIA Container Toolkit \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0441\u044b\u043b\u043e\u043a. \u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0434\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u0443\u0442\u0438 \u0442\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0438\u0437 \u043a\u043e\u0440\u043d\u0435\u0432\u043e\u0439 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0438 \u0445\u043e\u0441\u0442\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c Unix-\u0441\u043e\u043a\u0435\u0442\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432.\n\n\u0425\u043e\u0442\u044f \u0431\u0430\u0437\u043e\u0432\u044b\u0439 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0430\u0442\u0430\u043a\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043b\u0438\u0448\u044c \u0447\u0442\u0435\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0445\u043e\u0441\u0442\u0430, \u044d\u0442\u043e\u0442 \u0431\u0430\u0440\u044c\u0435\u0440 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u043e\u0439\u0442\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439. \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a, \u043f\u0440\u043e\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043d\u0430 \u0445\u043e\u0441\u0442\u0435.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c NVIDIA Container Toolkit \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0438 \u043d\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0444\u043b\u0430\u0433 \u00ab--no-cntlibs\u00bb \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-02-13T15:45:09.000000Z"}, {"uuid": "27638a84-0a00-452f-8ed7-fdb4ed843601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14435", "content": "\u200aCVE-2024-0132 (CVSS 9.0): Critical Vulnerabilities Found in NVIDIA Container Toolkit\n\nhttps://securityonline.info/cve-2024-0132-cvss-9-0-critical-vulnerabilities-found-in-nvidia-container-toolkit/", "creation_timestamp": "2024-09-27T18:12:51.000000Z"}, {"uuid": "0ba6c596-4ec5-4a12-ab28-0e2405eb6af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/5030", "content": "\u0412\u044b\u0448\u043b\u0430 \u043c\u043e\u044f \u0434\u043e\u043b\u0433\u043e\u0436\u0434\u0430\u043d\u043d\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u043f\u043e \u043c\u043e\u0442\u0438\u0432\u0430\u043c \u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e\u0434\u043d\u0435\u0433\u043e \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0430. \u0435\u0451 \u044f \u0431\u0435\u0437 \u043f\u0440\u0438 \u0443\u0432\u0435\u043b\u0438\u0447\u0435\u043d\u0438\u044f \u043f\u0438\u0441\u0430\u043b \u043c\u0435\u0441\u044f\u0446, \u044d\u0442\u043e \u0431\u044b\u043b(\u043e) \u0442\u044f\u0436\u0435\u043b\u043e \n\n\u0432\u043d\u0443\u0442\u0440\u0438 \u0432\u0430\u0441 \u0436\u0434\u0435\u0442:\n\n- \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043f\u043e\u0433\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0442\u043e\u0433\u043e \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043d\u044f\u0442\u044c \u043a\u0430\u043a \u0432\u0438\u0434\u0435\u043e\u043a\u0430\u0440\u0442\u044b \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c\u0438\n- \u0440\u0430\u0441\u043a\u0443\u0440 \u043f\u0430\u0442\u0447\u0430 \u0438 \u0441\u043e\u0440\u0446\u043e\u0432 \u043d\u0430 C\n- \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0431\u043e\u0435\u0432\u043e\u0433\u043e \u0441\u043f\u043b\u043e\u0439\u0442\u0430\n\nhttps://luntry.ru/lomaem-vashi-videokarty-raspakovka-eksplojta-dlya-cve-2024-0132-pod-nvidia-container-toolkit", "creation_timestamp": "2025-02-17T15:31:30.000000Z"}, {"uuid": "01b1c011-e43f-4144-ae17-b9db67696791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/rafa_sec/125", "content": "\ud83d\udea8 NVIDIA\u2019s critical security fix failed!\n\nNVIDIA\u2019s patch for CVE-2024-0132 (CVSS 9.0) was incomplete \u2014 attackers can still escape containers and gain root access (CVE-2025-23359).\n\n\ud83d\udc40 Admins: Threat actors are watching...\n\u2705 Patch now\n\u2705 Audit your containers\n\u2705 Lock down Docker APIs\n\nFull report \u2794 https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html", "creation_timestamp": "2025-04-15T09:16:23.000000Z"}, {"uuid": "76b836ac-5a76-4a55-ba07-84f9685cd5a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/DarkWebInformer_News/3017", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes\nLink: https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html", "creation_timestamp": "2025-04-10T14:53:57.000000Z"}, {"uuid": "7ac43c64-c067-4f95-be1d-fbca80cc6e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4810", "content": "\u041b\u043e\u043c\u0430\u0435\u043c \u0432\u0430\u0448\u0438 \u0432\u0438\u0434\u0435\u043e\u043a\u0430\u0440\u0442\u044b: \u0440\u0430\u0441\u043f\u0430\u043a\u043e\u0432\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f CVE-2024-0132 \u043f\u043e\u0434 NVIDIA Container Toolkit\n#nvidia #CVE@poxek #container\n\n\u0412 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f WIZ \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0443\u044e \u043a\u0430\u043a CVE-2024-0132, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u043b\u0430 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 NVIDIA Container Toolkit.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 NVIDIA Container Toolkit v1.16.2 \u0438 NVIDIA GPU Operator v24.6.2, \u043e\u0434\u043d\u0430\u043a\u043e \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u0442\u043e\u043b\u044c\u043a\u043e 11 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2024 \u0433\u043e\u0434\u0430. \u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u043d\u0430\u0448\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0430\u043c \u043f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c \u043f\u0430\u0442\u0447 \u0438 \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043e \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e\u0442 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\nP.s. \u0440\u0435\u0441\u043f\u0435\u043a\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u0435 Luntry\n\n\u27a1\ufe0f\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438\n\n\ud83c\udf1a @poxek | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK | \ud83c\udf1a \u041c\u0430\u0433\u0430\u0437\u0438\u043d \u043c\u0435\u0440\u0447\u0430", "creation_timestamp": "2025-02-17T14:26:16.000000Z"}, {"uuid": "c2812816-044d-40d2-97cb-0ddbf4fbcf70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/cvedetector/6385", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-0132 - NVIDIA Container Toolkit TOCTOU File System Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-0132 \nPublished : Sept. 26, 2024, 6:15 a.m. | 21\u00a0minutes ago \nDescription : NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T08:46:30.000000Z"}, {"uuid": "d1cd8a97-2f0d-4611-bb91-4cc05b6ac366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/ton618cyber/8819", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes\n\nIncomplete fix for CVE-2024-0132 in NVIDIA Toolkit leaves Linux Docker hosts vulnerable to container escapes and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Apr 10, 2025", "creation_timestamp": "2025-04-11T15:32:18.000000Z"}, {"uuid": "a37c6e39-2963-4ed6-9327-ec1d1a4354a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/CyberBulletin/3011", "content": "\u26a1\ufe0fNVIDIA\u2019s patch for CVE-2024-0132 (CVSS 9.0) was incomplete \u2014 attackers can still escape containers and gain root access (CVE-2025-23359).\n\n#CyberBulletin", "creation_timestamp": "2025-04-12T02:00:49.000000Z"}, {"uuid": "05fcf978-0e1d-42ec-9fbc-99600efbfb52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "Telegram/RuAQlUKocXlT4ofSDLT3CByJGT5eproP32lBf1VKLL_Cew", "content": "", "creation_timestamp": "2024-09-27T11:57:43.000000Z"}, {"uuid": "8a25089a-3c8f-440f-88c4-9fe5a050b3de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/cibsecurity/84193", "content": "\ud83d\udd8b\ufe0f Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \ud83d\udd8b\ufe0f\n\nCybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-11T06:48:01.000000Z"}, {"uuid": "41711766-55b2-4c06-b179-4b9ec462135f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/cibsecurity/84189", "content": "\ud83d\udd8b\ufe0f Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \ud83d\udd8b\ufe0f\n\nCybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-11T03:49:37.000000Z"}, {"uuid": "7b12e288-51a2-4866-8743-896647bdbe95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/cibsecurity/84183", "content": "\ud83d\udd8b\ufe0f Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \ud83d\udd8b\ufe0f\n\nCybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-11T03:46:44.000000Z"}, {"uuid": "ada69586-2e25-49b9-a861-1d5a466f7435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/cibsecurity/84178", "content": "\ud83d\udd8b\ufe0f Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \ud83d\udd8b\ufe0f\n\nCybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-11T03:45:20.000000Z"}, {"uuid": "b726cf1e-30c1-4c75-b4e3-dddedc18fe5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/3256", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \u2013 thehackernews.com\n\nThu, 10 Apr 2025 22:13:00", "creation_timestamp": "2025-04-10T18:03:33.000000Z"}, {"uuid": "239062fa-7d51-4061-b305-f50ec395dd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/11169", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \u2013 thehackernews.com\n\nThu, 10 Apr 2025 22:13:00", "creation_timestamp": "2025-04-10T18:03:33.000000Z"}, {"uuid": "4e0e9433-cbd6-4b67-9c7b-93d92f3e93e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/ton618cyber/3517", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes\n\nIncomplete fix for CVE-2024-0132 in NVIDIA Toolkit leaves Linux Docker hosts vulnerable to container escapes and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Apr 10, 2025", "creation_timestamp": "2025-04-11T15:32:18.000000Z"}, {"uuid": "6785d320-3001-4cbc-883d-6cd95e4c03cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/22055", "content": "The Hacker News\nCritical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers\n\nA critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and gain full access to the underlying host.\nThe vulnerability, tracked as CVE-2024-0132, carries a CVSS score of 9.0 out of a maximum of 10.0. It has been addressed in NVIDIA Container Toolkit version v1.16.2 and", "creation_timestamp": "2024-09-27T11:57:44.000000Z"}, {"uuid": "a7bd3850-66bf-46fc-b3c3-bee511ef604b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/29856", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes \u2013 thehackernews.com\n\nThu, 10 Apr 2025 22:13:00", "creation_timestamp": "2025-04-10T18:03:33.000000Z"}, {"uuid": "2cc358f8-32b2-4f28-a67d-c3d881e99e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "Telegram/PI7mXaB3sPCHK-_9azpUXjhziNWmC9mU8ar6cVUrchFCQg", "content": "", "creation_timestamp": "2025-04-10T19:31:25.000000Z"}, {"uuid": "5f4bd257-872a-4f9f-81c9-d3d395adb23e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "Telegram/l1OhCyzqUXTL0VlpHYokSaswd5uhNC06q2WBAvXQAC1RSg", "content": "", "creation_timestamp": "2024-09-27T17:22:51.000000Z"}, {"uuid": "812a0963-5168-44e0-b0af-68cdf41b13f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "Telegram/bFsNdV6crr7hBACRbifptwrhSKdXOkkG5COihB4VAC-suzQ", "content": "", "creation_timestamp": "2025-04-10T20:09:14.000000Z"}, {"uuid": "eaa83a0e-8939-4ff1-9828-e79015d8059d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/4663", "content": "The Hacker News\nCritical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers\n\nA critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and gain full access to the underlying host.\nThe vulnerability, tracked as CVE-2024-0132, carries a CVSS score of 9.0 out of a maximum of 10.0. It has been addressed in NVIDIA Container Toolkit version v1.16.2 and", "creation_timestamp": "2024-09-27T11:57:44.000000Z"}, {"uuid": "65c7e0b1-a9b1-4509-8fdd-dc372df9d3c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/KomunitiSiber/2638", "content": "Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers\nhttps://thehackernews.com/2024/09/critical-nvidia-container-toolkit.html\n\nA critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and gain full access to the underlying host.\nThe vulnerability, tracked as CVE-2024-0132, carries a CVSS score of 9.0 out of a maximum of 10.0. It has been addressed in NVIDIA Container Toolkit version v1.16.2 and", "creation_timestamp": "2024-09-27T09:03:26.000000Z"}, {"uuid": "583c99be-f344-4239-bf1d-14d9705e022d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "Telegram/dna2L0tyagQD9f1WDX08eOnxaut4-v5ScQQvGc2S8l8K19M", "content": "", "creation_timestamp": "2024-10-01T08:47:39.000000Z"}, {"uuid": "0c018cf2-22db-46cd-9a43-638cbe039537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/true_secator/6261", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wiz Research \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 NVIDIA Container Toolkit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0418\u0418 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u0438\u043b\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u0435.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-0132 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u0433\u0434\u0435 \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e.\n\n\u041a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u0430\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0430 \u043d\u0430 \u043c\u043d\u043e\u0433\u0438\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445, \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0418\u0418, \u0438 \u0432 \u043e\u0431\u0440\u0430\u0437\u0430\u0445 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d, \u044f\u0432\u043b\u044f\u044f\u0441\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u043c \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u043c\u0443 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0443 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f NVIDIA.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c\u00a0Wiz Research, \u0431\u043e\u043b\u0435\u0435 35% \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0440\u0435\u0434 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443 \u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\nCVE-2024-0132 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 9,0 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 NVIDIA Container Toolkit 1.16.1 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 GPU Operator 24.6.1 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0439 \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 \u043e\u0442 \u0445\u043e\u0441\u0442\u0430, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0447\u0443\u0432\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0447\u0430\u0441\u0442\u0438 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u0441\u0440\u0435\u0434\u044b \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f, \u0442\u0430\u043a\u0438\u043c \u043a\u0430\u043a \u0441\u043e\u043a\u0435\u0442\u044b Unix, \u0434\u043b\u044f \u043c\u0435\u0436\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043d\u043e\u0433\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f.\n\n\u0425\u043e\u0442\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043e\u043a\u0435\u0442\u044b Unix, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a docker.sock \u0438 containerd.sock, \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u044f\u043c\u043e\u0435 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0441 \u0445\u043e\u0441\u0442\u043e\u043c, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0430\u043a\u0438\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u0440\u0430\u0437\u0430 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0438 \u0434\u043e\u0441\u0442\u0438\u0447\u044c \u0445\u043e\u0441\u0442\u0430 \u043f\u0440\u0438 \u0435\u0433\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0435.\n\nWiz \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u0442\u0430\u043a\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u043b\u0438\u0431\u043e \u043d\u0430\u043f\u0440\u044f\u043c\u0443\u044e, \u0447\u0435\u0440\u0435\u0437 \u043e\u0431\u0449\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u044b \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430, \u043b\u0438\u0431\u043e \u043a\u043e\u0441\u0432\u0435\u043d\u043d\u043e, \u043a\u043e\u0433\u0434\u0430 \u0436\u0435\u0440\u0442\u0432\u0430 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0435, \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435 \u0438\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0430.\n\nNVIDIA \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0438 \u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 1 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c GPU \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u0443 \u0434\u043d\u0435\u0439 \u0441\u043f\u0443\u0441\u0442\u044f \u0438 26 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f, \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0432\u0440\u0435\u043c\u044f \u0434\u043b\u044f \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u0441\u0432\u043e\u0438\u0445 \u0441\u0440\u0435\u0434\u0430\u0445.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0432\u0441\u0435 \u043c\u043e\u0436\u0435\u0442 \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c\u0441\u044f \u0443\u0436\u0435 \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0439 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0435, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c NVIDIA Container Toolkit \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1.16.2 \u0438 NVIDIA GPU Operator \u0434\u043e 24.6.2.", "creation_timestamp": "2024-09-30T14:40:05.000000Z"}, {"uuid": "a808a205-dc2b-4708-b73f-b227cd0d3008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6729", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wiz \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u043e\u0431\u0445\u043e\u0434\u0430 \u0443\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 NVIDIA Container Toolkit, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u0445\u043e\u0434\u0430 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0431\u0430\u0437\u043e\u0432\u043e\u043c\u0443 \u0445\u043e\u0441\u0442\u0443.\n\n\u041d\u043e\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-23359 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS: 8.3.\n\n\u041e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 NVIDIA Container Toolkit (\u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 1.17.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 1.17.4) \u0438 NVIDIA GPU Operator (\u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 24.9.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 24.9.2).\n\n\u0412 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e\u044f\u0441\u043d\u044f\u044e\u0442, \u0447\u0442\u043e NVIDIA Container Toolkit \u0434\u043b\u044f Linux \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c TOCTOU\u00a0(Time-of-Check Time-of-Use) \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0441 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0435\u0439 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u043a\u043e\u0433\u0434\u0430 \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0445\u043e\u0441\u0442\u0430.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE, DoS, EoP, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wiz \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0432 \u0435\u0435 \u043a\u0430\u043a \u043e\u0431\u0445\u043e\u0434 \u0434\u0440\u0443\u0433\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2024-0132 \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS: 9,0, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 NVIDIA \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430.\n\n\u0412\u043a\u0440\u0430\u0442\u0446\u0435, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u043e\u0440\u043d\u0435\u0432\u0443\u044e \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0445\u043e\u0441\u0442\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0438\u043c \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u0444\u0430\u0439\u043b\u0430\u043c.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u044d\u0442\u043e\u0442 \u0434\u043e\u0441\u0442\u0443\u043f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0432\u0437\u043b\u043e\u043c\u0430 \u0445\u043e\u0441\u0442\u0430 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u043a\u0435\u0442 Unix \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f.\n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u043f\u043e\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e \u043f\u0443\u0442\u0438 \u043a \u0444\u0430\u0439\u043b\u0430\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043c\u043e\u0436\u043d\u043e \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u0438\u043c\u0432\u043e\u043b\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0441\u044b\u043b\u043a\u0438 \u0434\u043e\u0431\u0438\u0432\u0430\u044f\u0441\u044c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0437\u0432\u043d\u0435 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 (\u0442.\u0435. \u0438\u0437 \u043a\u043e\u0440\u043d\u0435\u0432\u043e\u0433\u043e \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430) \u0432 \u043f\u0443\u0442\u044c \u0432\u043d\u0443\u0442\u0440\u0438 \u00ab/usr/lib64\u00bb.\n\n\u0425\u043e\u0442\u044f \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0445\u043e\u0441\u0442\u0430, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0439 \u043f\u0440\u0438 \u0432\u044b\u0445\u043e\u0434\u0435 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430, \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f, \u044d\u0442\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u043e\u0439\u0442\u0438, \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044f \u0441 \u0441\u043e\u043a\u0435\u0442\u0430\u043c\u0438 Unix \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u044d\u0442\u043e\u0442 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a, \u043e\u0442\u043b\u0430\u0436\u0438\u0432\u0430\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0440\u044f\u0434 \u0434\u0440\u0443\u0433\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u0445\u043e\u0441\u0442\u0430.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c NVIDIA Container Toolkit \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c\u00a0\u0444\u043b\u0430\u0433 \u00ab--no-cntlibs\u00bb\u00a0\u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445.", "creation_timestamp": "2025-02-13T13:35:57.000000Z"}, {"uuid": "19c31671-aacf-45e4-a586-f1052576e2b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/ctinow/233667", "content": "Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes\nhttps://ift.tt/8Bql0dE", "creation_timestamp": "2025-04-10T16:59:28.000000Z"}, {"uuid": "d460c8a8-c496-457b-b0db-e100f6c7ba31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/ctinow/233633", "content": "Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks\nhttps://ift.tt/yXRho0W", "creation_timestamp": "2025-04-10T11:09:44.000000Z"}, {"uuid": "9cbf770f-92bf-4a8e-a974-c4d9a4f32dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "seen", "source": "https://t.me/ctinow/233630", "content": "Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks\nhttps://ift.tt/yXRho0W", "creation_timestamp": "2025-04-10T10:29:44.000000Z"}, {"uuid": "23f5e9b6-a7e7-4c1e-bb6e-a6a13c56078d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3882", "content": "https://luntry.ru/lomaem-vashi-videokarty-raspakovka-eksplojta-dlya-cve-2024-0132-pod-nvidia-container-toolkit", "creation_timestamp": "2025-02-17T16:43:37.000000Z"}, {"uuid": "1c2c15ee-df5f-4eab-9a42-5b7bd811d477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0132", "type": "exploited", "source": "https://t.me/thehackernews/6648", "content": "\ud83d\udea8 NVIDIA\u2019s critical security fix failed!\n\nNVIDIA\u2019s patch for CVE-2024-0132 (CVSS 9.0) was incomplete \u2014 attackers can still escape containers and gain root access (CVE-2025-23359).\n\n\ud83d\udc40 Admins: Threat actors are watching...\n\u2705 Patch now\n\u2705 Audit your containers\n\u2705 Lock down Docker APIs\n\nFull report \u2794 https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html", "creation_timestamp": "2025-04-10T16:19:38.000000Z"}]}