fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

NVIDIA Fixes Severe Flaw In GeForce NOW Cloud Gaming Service

NVIDIA Fixes Severe Flaw In GeForce NOW Cloud Gaming Service

NVIDIA released a security update for the GeForce Now cloud gaming Windows app to address a vulnerability that could allow attackers to execute arbitrary code or escalate privileges on systems running unpatched software.

GeForce Now is a cloud-based game streaming service that allows users over 80 countries with paid subscriptions to stream free-to-play or games they own, in real-time, from a library of hundreds of titles hosted on NVIDIA’s servers.

NVIDIA’s cloud gaming service can be used by customers who own NVIDIA Shield, desktop (macOS, Microsoft Windows, and ChromeOS), or mobile (Android) devices via dedicated apps.

Also Read: The 5 Benefits Of Outsourcing Data Protection Officer Service

High severity flaw fixed in the Windows app

NVIDIA has fixed today a high severity vulnerability (CVE‑2020‑5992) in all versions of the Windows GeForce Now app prior to 2.0.25.119 to prevent local attackers from elevating their privileges or executing code after successful exploitation.

The vulnerability was reported by Qihoo 360 CERT’s Hou JingYi and it was found in the OpenSSL library, one of GeForce Now’s open-source software dependencies.

While this flaw requires attackers to have local user access and thus it cannot be exploited remotely, it can still be abused using malicious tools deployed on systems running vulnerable app versions as NVIDIA explains in a security advisory published today.

CVE IDsDescriptionBase ScoreVector
CVE‑2020‑5992NVIDIA GeForce NOW application software on Windows contains a vulnerability in its open-source software dependency in which the OpenSSL library is vulnerable to binary planting attacks by a local user, which may lead to code execution or escalation of privileges.7.3AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Attacks that would exploit this bug are of low complexity and require low privileges that provide basic user capabilities.

Luckily, any attacks designed to abuse the CVE‑2020‑5992 vulnerability also need user interaction before successful exploitation.

NVIDIA says that the “risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation.”

The company also advises “consulting a security or IT professional to evaluate the risk to your specific configuration.”

Applying the GeForce Now security update

To apply the security update and protect your system, you have to open the Windows GeForce Now app to have it automatically downloaded and then follow the instructions to install it (the app requires admin privileges to update itself).

If you cannot run the app as an admin user, you can also manually update it by removing it using these instructions and then installing the latest software version (i.e., 2.0.25.119).

Also Read: How To Prevent WhatsApp Hack: 7 Best Practices

Last month, NVIDIA also fixed high severity vulnerabilities in the Windows NVIDIA GeForce Experience (GFE) app that could allow attackers to gain access to sensitive info, trigger a denial of service (DoS) state, escalate privileges, or execute arbitrary code on vulnerable systems.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us