Nvidia tells users to update GPU drivers now or face possible attack — here's what we know

IA y ciberseguridad
(Image credit: Forcepint)

  • NVIDIA releass new GPU driver updates for Windows and Linux
  • Fixes 14 vulnerabilities across GeForce, RTX, Quadro, Tesla, NVS, vGPU, and Cloud Gaming software
  • The most severe flaw, CVE‑2026‑24187, is a use‑after‑free bug rated 8.8/10 that enables code execution, privilege escalation, data theft, or system crashes

Nvidia has issued a new patch for its GPU display drivers, fixing 14 vulnerabilities in both Windows and Linux.

The majority of the flaws are labeled as “high-severity”, which is why Nvidia urged its users to apply the fixes without delay.

In a newly released security advisory, Nvidia said it fixed bugs in GeForce, RTX, Quadro, Tesla, and NVS product lines, as well as its vGPU and Cloud Gaming software.

Latest Videos From

How to patch up

The biggest vulnerability to be fixed is a “use-after-free” memory flaw, now tracked as CVE-2026-24187. With a severity of 8.8/10 (high), this bug allows threat actors to execute arbitrary code, steal data, escalate privileges, and even crash entire systems.

Several other high-severity vulnerabilities allow malicious actors to do similar things, from code execution to privilege escalation, and from data tampering to information disclosure.

One affects both Windows and Linux systems through improper access to GPU resources in the kernel layer, while another targets Windows specifically through a timing flaw that could be exploited to manipulate system operations.

Among the fixed flaws are two in Nvidia’s Unified Virtual Memory subsystem on Linux, which could lead to denial-of-service attacks without the need for elevated permissions. Nvidia's vGPU software, used in virtualized and cloud environments, also received patches for two vulnerabilities in the virtual GPU manager component.

Users can now download the updated drivers either through the Nvidia Driver Downloads page, or through the Nvidia Licensing Portal, depending on which products they’re running. Windows users should look for the driver version 569.49 and newer, while those running Linux, version 590.48.01.

Besides making sure the software is patched, users should also always keep their Windows Defender (or other antivirus programs) up and running at all times.

The company credited several external security researchers for responsibly reporting the flaws, including researchers from Seoul National University and Binarly Research Team.


Best antivirus software header
The best antivirus for all budgets

Google logo on a black background next to text reading 'Click to follow TechRadar'

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.


TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.