Cato Networks Knowledge Base

CVE-2022-28199 - NVIDIA DPDK Vulnerability

  • Updated

Overview

This article will discuss information pertaining to the critical NVIDIA DPDK vulnerability, which may impact vSockets running on virtual machines in Microsoft Azure. In addition, the article details the steps that Cato is taking to ensure that our customers stay protected.

This article pertains to CVE-2022-28199 which has been assigned a base CVSS score of 9.8 (CRITICAL).

Background and Impact

Microsoft and NIVDIA announced that there is critical vulnerability in the DPDK code that allows a command injection via the filename parameter in /setting/CloudACMunualUpdate

This vulnerability may impact Cato vSocket sites that use the Standard_D3_v2 or Standard_D8s_v3 virtual machines instances running in Azure.

What is Cato Doing?

Cato is pushing an updated vSocket version that includes a patch to protect against CVE-2022-28199. The updated versions should install automatically on the vSocket sites during the next maintenance window configured for your account. Make sure that your vSockets are running on of the following versions or higher:

  • v13 - version 13.0.15348
  • v14 - version 14.0.15342
  • v15 - version 15.0.15345

Questions? Please contact Support.

What Do I Need to Do?

The vSocket update to the patched version is expected to occur automatically, and no action is required on your part.

After the next maintenance window for your account, please review your Azure vSocket sites - make sure that for each major Socket version, the sites are running the minor version above (or higher).

If your vSocket site is running an older major Socket version (v12 and earlier), please contact Support to upgrade to a newer major Socket version.

Was this article helpful?

0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.