Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
virtual_gpu Vendor: nvidia

About This Product

virtual_gpu is a software product offered by nvidia. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 98 known vulnerabilities affecting nvidia virtual_gpu. This includes 43 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2020 to 2024, indicating a recent active security attention. 53 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-5973 2020-06-30 2024-11-21 4.4 2.1 Unknown
CVE-2021-1097 2021-07-21 2024-11-21 7.8 4.6 Unknown
CVE-2021-1098 2021-07-21 2024-11-21 7.8 4.6 Unknown
CVE-2021-1099 2021-07-21 2024-11-21 7.0 4.6 Unknown
CVE-2021-1100 2021-07-21 2024-11-21 6.2 2.1 Unknown
CVE-2021-1101 2021-07-21 2024-11-21 5.5 2.1 Unknown
CVE-2021-1102 2021-07-21 2024-11-21 5.5 2.1 Unknown
CVE-2021-1103 2021-07-21 2024-11-21 4.4 2.1 Unknown
CVE-2021-1118 2021-10-29 2024-11-21 7.8 4.6 Unknown
CVE-2021-1119 2021-10-29 2024-11-21 7.1 3.6 Unknown
CVE-2021-1120 2021-10-29 2024-11-21 7.0 4.6 Unknown
CVE-2021-1121 2021-10-29 2024-11-21 5.5 2.1 Unknown
CVE-2021-1122 2021-10-29 2024-11-21 5.5 2.1 Unknown
CVE-2021-1123 2021-10-29 2024-11-21 5.5 2.1 Unknown
CVE-2022-21813 2022-02-07 2024-11-21 6.1 3.6 Unknown
CVE-2022-21815 2022-02-07 2024-11-21 5.5 4.9 Unknown
CVE-2022-21816 2022-02-07 2024-11-21 5.5 4.9 Unknown
CVE-2022-28181 2022-05-17 2024-11-21 8.5 6.9 Unknown
CVE-2022-28182 2022-05-17 2024-11-21 8.5 6.8 Likely
CVE-2022-28183 2022-05-17 2024-11-21 7.7 3.6 Unknown
CVE-2022-28184 2022-05-17 2024-11-21 7.1 4.6 Unknown
CVE-2022-28185 2022-05-17 2024-11-21 6.8 3.6 Unknown
CVE-2022-28186 2022-05-17 2024-11-21 6.1 3.6 Unknown
CVE-2022-28188 2022-05-17 2024-11-21 5.5 4.9 Unknown
CVE-2022-28191 2022-05-17 2024-11-21 5.5 4.9 Unknown
CVE-2022-28192 2022-05-17 2024-11-21 4.1 1.9 Unknown
CVE-2022-31609 2022-08-05 2024-11-21 7.8 - -
CVE-2022-31614 2022-08-05 2024-11-21 7.0 - -
CVE-2022-31618 2022-08-05 2024-11-21 5.5 - -
CVE-2022-34666 2022-11-10 2024-11-21 6.5 - -
CVE-2022-31606 2022-11-19 2024-11-21 7.8 - -
CVE-2022-31610 2022-11-19 2024-11-21 7.8 - -
CVE-2022-31612 2022-11-19 2024-11-21 7.1 - -
CVE-2022-31613 2022-11-19 2024-11-21 7.1 - -
CVE-2022-31616 2022-11-19 2024-11-21 6.1 - -
CVE-2022-31617 2022-11-19 2024-11-21 7.8 - -
CVE-2022-34665 2022-11-19 2024-11-21 6.5 - -
CVE-2022-34669 2022-12-30 2024-11-21 8.8 - -
CVE-2022-34670 2022-12-30 2024-11-21 7.8 - -
CVE-2022-34672 2022-12-30 2024-11-21 7.8 - -
CVE-2022-34674 2022-12-30 2024-11-21 6.8 - -
CVE-2022-34676 2022-12-30 2024-11-21 7.1 - -
CVE-2022-34677 2022-12-30 2024-11-21 5.5 - -
CVE-2022-34678 2022-12-30 2025-04-10 6.5 - -
CVE-2022-34679 2022-12-30 2024-11-21 5.5 - -
CVE-2022-34680 2022-12-30 2025-04-10 5.5 - -
CVE-2022-34681 2022-12-30 2025-04-10 5.5 - -
CVE-2022-34682 2022-12-30 2024-11-21 5.5 - -
CVE-2022-34683 2022-12-30 2024-11-21 5.5 - -
CVE-2022-34684 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42254 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42255 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42256 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42257 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42258 2022-12-30 2024-11-21 5.3 - -
CVE-2022-42259 2022-12-30 2024-11-21 4.4 - -
CVE-2022-42260 2022-12-30 2024-11-21 7.8 - -
CVE-2022-42261 2022-12-30 2024-11-21 7.8 - -
CVE-2022-42262 2022-12-30 2024-11-21 7.1 - -
CVE-2022-42263 2022-12-30 2024-11-21 7.1 - -
CVE-2022-42264 2022-12-30 2024-11-21 7.1 - -
CVE-2022-42266 2022-12-30 2024-11-21 5.5 - -
CVE-2022-42267 2022-12-30 2024-11-21 7.0 - -
CVE-2023-0180 2023-04-01 2024-11-21 7.1 - -
CVE-2023-0181 2023-04-01 2024-11-21 7.1 - -
CVE-2023-0182 2023-04-01 2024-11-21 7.8 - -
CVE-2023-0183 2023-04-01 2024-11-21 7.1 - -
CVE-2023-0185 2023-04-01 2024-11-21 6.7 - -
CVE-2023-0186 2023-04-01 2024-11-21 6.1 - -
CVE-2023-0187 2023-04-01 2024-11-21 6.1 - -
CVE-2023-0188 2023-04-01 2024-11-21 5.5 - -
CVE-2023-0189 2023-04-01 2024-11-21 8.8 - -
CVE-2023-0191 2023-04-01 2024-11-21 7.1 - -
CVE-2023-0192 2023-04-01 2024-11-21 4.7 - -
CVE-2023-0194 2023-04-01 2024-11-21 2.0 - -
CVE-2023-0195 2023-04-01 2024-11-21 2.0 - -
CVE-2023-0197 2023-04-01 2024-11-21 5.5 - -
CVE-2023-0198 2023-04-01 2024-11-21 6.6 - -
CVE-2023-25515 2023-06-23 2024-11-21 7.8 - -
CVE-2023-31016 2023-11-02 2024-11-21 7.3 - -
CVE-2023-31017 2023-11-02 2024-11-21 7.8 - -
CVE-2023-31018 2023-11-02 2024-11-21 6.5 - -
CVE-2023-31019 2023-11-02 2024-11-21 7.8 - -
CVE-2023-31020 2023-11-02 2024-11-21 6.1 - -
CVE-2023-31021 2023-11-02 2024-11-21 5.5 - -
CVE-2023-31022 2023-11-02 2024-11-21 5.5 - -
CVE-2023-31023 2023-11-02 2024-11-21 5.5 - -
CVE-2023-31026 2023-11-02 2024-11-21 6.0 - -
CVE-2023-31027 2023-11-02 2024-11-21 8.2 - -
CVE-2024-0084 2024-06-13 2024-11-21 7.8 - -
CVE-2024-0085 2024-06-13 2024-11-21 6.3 - -
CVE-2024-0086 2024-06-13 2024-11-21 5.5 - -
CVE-2024-0089 2024-06-13 2024-11-21 7.8 - -
CVE-2024-0090 2024-06-13 2024-11-21 7.8 - -
CVE-2024-0091 2024-06-13 2024-11-21 7.8 - -
CVE-2024-0092 2024-06-13 2024-11-21 5.5 - -
CVE-2024-0093 2024-06-13 2024-11-21 6.5 - -
CVE-2024-0107 2024-08-08 2025-11-04 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for nvidia virtual_gpu by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.