In its latest security advisory, NVIDIA advises Windows users to update their GPU Display Driver software to address security vulnerabilities.
The affected software products include GeForce, Quadro, NVS and Tesla display drivers.
If Windows systems, that are operating the affected software drivers, are left unpatched, it could expose those systems to local code execution, denial of service, or escalation of privileges, which are security loopholes for potential exploitation by hackers.
The high-risk vulnerabilities include CVE-2019-5683, CVE-2019-5684 and CVE-2019-5685, and the other two, CVE-2019-5686 and CVE-2019-5687 are considered medium-risk.
According to NVIDIA, two of the flaws were uncovered by a security researcher Piotr Bania from Cisco Talos.
According to Project Zero staff member Oliver Chang, the software drivers of the modern-day GPU "are complicated"; coupled with access to the GPU by processes like the Chrome GPU process, vulnerabilities of NVIDIA kernel mode Windows drivers exist; however, they may not be commonly targeted by hackers.
To err on the side of caution, please head over to NVIDIA Driver Downloads to patch your affected Windows system immediately.
The article was first published in Hardware Zone.