<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-24189 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-24189/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 17:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-24189/feed.xml" rel="self" type="application/rss+xml"/><item><title>NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</link><pubDate>Tue, 21 Apr 2026 17:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</guid><description>NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.</description><content:encoded><![CDATA[<p>NVIDIA CUDA-Q contains a vulnerability identified as CVE-2026-24189 that allows an unauthenticated attacker to trigger an out-of-bounds read. This vulnerability exists in an unspecified endpoint of the CUDA-Q software. By sending a maliciously crafted request, an attacker can potentially read sensitive information from memory or cause a denial-of-service condition. This vulnerability has a CVSS v3.1 score of 8.2, indicating a high severity. Successful exploitation can lead to both information disclosure and service disruption, impacting the confidentiality and availability of systems running vulnerable versions of CUDA-Q. This is particularly concerning for systems processing sensitive data or providing critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CUDA-Q endpoint exposed over the network.</li>
<li>The attacker crafts a malicious request designed to trigger an out-of-bounds read. This likely involves manipulating request parameters to access memory outside of the intended buffer.</li>
<li>The attacker sends the malicious request to the vulnerable CUDA-Q endpoint.</li>
<li>The CUDA-Q software processes the request without proper bounds checking.</li>
<li>The software attempts to read memory outside of the allocated buffer, triggering an out-of-bounds read condition.</li>
<li>If the out-of-bounds read is successful, the attacker gains access to sensitive information stored in memory.</li>
<li>The attacker may cause a denial-of-service condition by triggering a crash or unexpected behavior due to the memory access violation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24189 can lead to a denial of service, rendering the CUDA-Q service unavailable. Additionally, the out-of-bounds read can expose sensitive information stored in memory, potentially leading to further compromise. The severity of the impact depends on the nature of the data accessible via the out-of-bounds read. Sectors relying on CUDA-Q for computationally intensive tasks are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting CUDA-Q endpoints to detect potential exploitation attempts (category: webserver, product: linux).</li>
<li>Apply any available patches or updates from NVIDIA to address the CVE-2026-24189 vulnerability.</li>
<li>Deploy the Sigma rule to detect suspicious HTTP requests (rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24189</category><category>out-of-bounds read</category><category>nvidia</category></item></channel></rss>