NVIDIA confirms three security vulnerabilities in GeForce Experience

Published: 24th Oct 2020, 08:29 GMT   Comments

NVIDIA Security Bulletin

NVIDIA has released a software security update for NVIDIA® GeForce Experience™ software. This update addresses issues that may lead to denial of service, escalation of privileges, code execution, or information disclosure.

To protect your system, download and install this software update from the GeForce Experience Downloads page or open the client to automatically apply the security update.


This section provides a summary of potential vulnerabilities and their impact that this security update addresses. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.

CVE IDsDescriptionBase Score
CVE‑2020‑5977NVIDIA GeForce Experience contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.8.2
CVE‑2020‑5990NVIDIA GeForce Experience contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.7.3
CVE‑2020‑5978NVIDIA GeForce Experience contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges.3.2

The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.

Security Updates

The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update.

Download the updates from the GeForce Experience Downloads page or open the client to automatically apply the security update.

CVE IDs AddressedSoftware ProductOperating SystemAffected VersionsUpdated Version
GeForce ExperienceWindowsAll versions prior to


See Security Updates for the version to install.


NVIDIA thanks following individuals for reporting the issues:

  • CVE‑2020‑5977: Xavier DANEST – Decathlon
  • CVE‑2020‑5978: Hashim Jawad of ACTIVELabs
  • CVE‑2020‑5990: Hashim Jawad of ACTIVELabs

The end of NVIDIA Security Bulletin

Comment Policy
  • Comments must be written in English.
  • Comments deemed to be spam or solely promotional in nature will be deleted. Including a link to relevant content is permitted, but comments should be relevant to the post topic.
  • Comments and usernames containing language or concepts that could be deemed offensive will be deleted. Note this may include abusive, threatening, pornographic, offensive, misleading, or libelous language.
  • Comments complaining about the article subject or its source will be removed.
  • A failure to comply with these rules will result in a warning and, in extreme cases, a ban.
  • Please note that comments that attack or harass an individual directly will be deleted and such comments will result in a ban.
  • VideoCardz Moderating Team reserves the right to edit or delete any comments submitted to the site without notice.
  • If you would like to appeal for a comment section ban to be removed, please use this page.
  • If you have any questions about the commenting policy, please let us know through the Contact Page.
  • NEW: Due to the recent increased amount of spam all links will require moderator approval. 
Hide Comment Policy