Impact
NVIDIA SNAP-4 Container has a bug in its configuration interface that incorrectly calculates a buffer size when receiving crafted configuration data, leading to a crash of the SNAP service. The crash results in a denial of service for the storage service that relies on SNAP. The weakness falls under the category of buffer size miscalculation and is identified as CWE‑131.
Affected Systems
The vulnerability affects NVIDIA SNAP‑4 Container systems. No specific product version information is provided in the public description, so any deployment of SNAP‑4 Container remains potentially exposed until a vendor‑issued patch or update is applied.
Risk and Exploitability
The CVSS score of 6.8 indicates a medium severity impact, and the entry is not currently listed in the CISA Known Exploited Vulnerabilities catalog. EPSS information is unavailable, making it difficult to gauge current exploitation likelihood. The likely attack vector is a local attacker within a virtual machine that can send custom configuration commands to the SNAP service. Exploit execution requires that the attacker can reach the configuration interface, which may be reachable from within the virtual machine hosting the service. A successful exploitation would interrupt the storage service for all users on the host, potentially causing operational disruption.
OpenCVE Enrichment