NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)
NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.
NVIDIA CUDA-Q contains a vulnerability identified as CVE-2026-24189 that allows an unauthenticated attacker to trigger an out-of-bounds read. This vulnerability exists in an unspecified endpoint of the CUDA-Q software. By sending a maliciously crafted request, an attacker can potentially read sensitive information from memory or cause a denial-of-service condition. This vulnerability has a CVSS v3.1 score of 8.2, indicating a high severity. Successful exploitation can lead to both information disclosure and service disruption, impacting the confidentiality and availability of systems running vulnerable versions of CUDA-Q. This is particularly concerning for systems processing sensitive data or providing critical services.
Attack Chain
- The attacker identifies a vulnerable CUDA-Q endpoint exposed over the network.
- The attacker crafts a malicious request designed to trigger an out-of-bounds read. This likely involves manipulating request parameters to access memory outside of the intended buffer.
- The attacker sends the malicious request to the vulnerable CUDA-Q endpoint.
- The CUDA-Q software processes the request without proper bounds checking.
- The software attempts to read memory outside of the allocated buffer, triggering an out-of-bounds read condition.
- If the out-of-bounds read is successful, the attacker gains access to sensitive information stored in memory.
- The attacker may cause a denial-of-service condition by triggering a crash or unexpected behavior due to the memory access violation.
Impact
Successful exploitation of CVE-2026-24189 can lead to a denial of service, rendering the CUDA-Q service unavailable. Additionally, the out-of-bounds read can expose sensitive information stored in memory, potentially leading to further compromise. The severity of the impact depends on the nature of the data accessible via the out-of-bounds read. Sectors relying on CUDA-Q for computationally intensive tasks are at risk.
Recommendation
- Monitor web server logs for suspicious requests targeting CUDA-Q endpoints to detect potential exploitation attempts (category: webserver, product: linux).
- Apply any available patches or updates from NVIDIA to address the CVE-2026-24189 vulnerability.
- Deploy the Sigma rule to detect suspicious HTTP requests (rules).
Detection coverage 2
Detect Suspicious CUDA-Q HTTP Requests
highDetects potentially malicious HTTP requests targeting CUDA-Q endpoints that may indicate an out-of-bounds read attempt.
Detect Possible CUDA-Q Out-of-Bounds Read via HTTP Status
mediumDetects unusual HTTP status codes that may indicate a server error resulting from an out-of-bounds read attempt against CUDA-Q.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| NVD@nist.gov |