Cyber Posture

CVE-2024-0148

High

Published: 25 February 2025

Published
25 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0007 20.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-0148 is a high-severity Unimplemented or Unsupported Feature in UI (CWE-447) vulnerability in Custhelp (inferred from references). Its CVSS base score is 7.6 (High).

Operationally, ranked at the 20.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 PE-3 (Physical Access Control) and SC-41 (Port and I/O Device Access).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prevents unprivileged attackers from gaining the physical access to the device required to enter RCM boot mode and load untrusted code.

preventrecover

Requires timely identification, reporting, and correction of the specific flaw in UEFI firmware RCM boot mode, directly mitigating the vulnerability via patching.

prevent

Restricts physical access to ports, connectors, and I/O devices exploited in RCM boot mode to load untrusted code.

NVD Description

NVIDIA Jetson Linux and IGX OS image contains a vulnerability in the UEFI firmware RCM boot mode, where an unprivileged attacker with physical access to the device could load untrusted code. A successful exploit might lead to code execution, escalation…

more

of privileges, data tampering, denial of service, and information disclosure. The scope of the impacts can extend to other components.

Deeper analysisAI

CVE-2024-0148 affects the UEFI firmware RCM boot mode in NVIDIA Jetson Linux and IGX OS images. The vulnerability enables an unprivileged attacker with physical access to the device to load untrusted code, which could result in code execution, escalation of privileges, data tampering, denial of service, and information disclosure. Impacts may extend to other components. It carries a CVSS v3.1 base score of 7.6 (AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and is linked to CWE-447.

Exploitation requires physical access to the device (AV:P) by an unprivileged attacker (PR:N) with low complexity (AC:L) and no user interaction (UI:N). Successful attacks can achieve high impacts on confidentiality, integrity, and availability, with a changed scope (S:C) potentially affecting additional components beyond the vulnerable one.

The NVIDIA security advisory provides details on mitigation and patching; refer to https://nvidia.custhelp.com/app/answers/detail/a_id/5617 for guidance.

Details

CWE(s)

Affected Products

Custhelp
inferred from references and description; NVD did not file a CPE for this CVE

References