7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
0.001 Low
EPSS
Percentile
34.6%
NVIDIA SHIELD TV security updates for vulnerabilities that may lead to denial of service, information disclosure, or escalation of privileges
The following sections summarize the potential vulnerabilities. Descriptions use CWE™ and risk assessments follow CVSS.
NVIDIA Tegra kernel driver contains a vulnerability in NVMAP
where an attacker has the ability to write an arbitrary value to an arbitrary location, which may lead to an escalation of privileges.
CVSS Base Score: 9.3 CVSS Temporal Score: 8.4 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
NVIDIA Tegra OpenMax Component contains a vulnerability in OMX.Nvidia.aac.decoder
, which is not actively used or maintained, where disabling the dead code to avoid malicious software instantiates this component and may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 8.4 CVSS Temporal Score: 7.6 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
NVIDIA TrustZone Software contains a vulnerability in the Keymaster implementation where the software reads data past the end, or before the beginning, of the intended buffer; and may lead to denial of service or information disclosure.
CVSS Base Score: 8.4 CVSS Temporal Score: 7.3 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H/E:U/RL:O/RC:C
NVIDIA Tegra OpenMax Component contains a vulnerability in OMX.Nvidia.audio.render
, which is not actively used or maintained, where there is the potential for mediaserver to reference memory after it has been freed which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 8.0 CVSS Temporal Score: 7.2 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C
NVIDIA OpenMax Component contains a vulnerability in LIBNVMMLITE_VIDEO.SO
where there is the potential for mediaserver to reference memory after it has been freed, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 7.8 CVSS Temporal Score: 7.0 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
NVIDIA Security Engine contains a vulnerability in the RSA function where the keyslot read/write lock permissions are cleared on a chip reset, which may lead to information disclosure.
CVSS Base Score: 7.1 CVSS Temporal Score: 6.8 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:X/RL:O/RC:C
NVIDIA Security Engine contains a vulnerability in the Deterministic Random Bit Generator (DRBG) where the DRBG does not properly initialize and store or transmits sensitive data using a weakened encryption scheme that is unable to protect sensitive data, which may lead to information disclosure.
CVSS Base Score: 7.1 CVSS Temporal Score: 6.8 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:X/RL:O/RC:C
NVIDIA TrustZone Software contains a TOCTOU issue in the DRM application which may lead to the denial of service or possible escalation of privileges.
CVSS Base Score: 5.5 CVSS Temporal Score: 4.8 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.
Product | OS | Versions |
---|---|---|
SHIELD TV | Android | SE 6.2 and earlier |
Updates for SHIELD are available from Settings >About>System update.
Product | OS | Updated Version |
---|---|---|
SHIELD TV | Android | SE 6.3 |
Notes:
Customers using earlier driver branches of this product should upgrade to one of the updated supported driver branches listed.
SHIELD TV 6.3 also contains updates for CPU speculative side-channel vulnerabilities. For more information, see Security Bulletin ID: 4613.
None.
None.
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
0.001 Low
EPSS
Percentile
34.6%