PatchSiren cyber security CVE debrief
CVE-2017-0317 Microsoft CVE debrief
CVE-2017-0317 is a local privilege-escalation issue in NVIDIA GPU and GeForce Experience installer workflows. The installer fails to set proper permissions on the package extraction path, which can let a non-privileged user modify extracted files and potentially influence what code is executed during installation. NVD rates the issue 7.5 HIGH, with local attack requirements and a changed scope impact.
- Vendor
- Microsoft
- Product
- CVE-2017-0317
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-15
- Advisory updated
- 2026-05-13
Who should care
Windows endpoint and desktop teams, IT administrators, and users who install or update NVIDIA GPU drivers or GeForce Experience on systems where standard users can access installer staging or extraction locations.
Technical summary
According to the NVD record, the vulnerable component is the NVIDIA GPU driver installer path, with the issue tied to CWE-732 (incorrect permission assignment for critical resource). The CVSS vector (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates a local attack that still requires user interaction and some prior local access, but can lead to high impact if an attacker tampers with files extracted by the installer. The source metadata links the issue to an NVIDIA PSIRT advisory.
Defensive priority
High priority for systems that use NVIDIA GPU or GeForce Experience installers, especially where untrusted or non-admin users can reach installer extraction directories.
Recommended defensive actions
- Follow the NVIDIA PSIRT advisory referenced by NVD and apply any vendor-provided remediation or updated installer packages.
- Restrict write access to installer extraction, staging, and temporary directories so only trusted administrative processes can modify them.
- Run NVIDIA installers and update workflows from trusted, admin-controlled locations and avoid shared or user-writable paths.
- Review endpoints for local users or automation that can access installer package contents during installation windows.
- Prioritize remediation on systems that regularly deploy NVIDIA GPU or GeForce Experience software, since the flaw can be leveraged for privilege escalation.
Evidence notes
This debrief is based on the supplied NVD record and its vendor reference. The source description states that NVIDIA GPU and GeForce Experience installers fail to set proper permissions on the package extraction path, allowing tampering by a non-privileged user. The NVD metadata lists CWE-732 and the CVSS 3.0 vector AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H. NVD references the NVIDIA PSIRT advisory at http://nvidia.custhelp.com/app/answers/detail/a_id/4398. The supplied source metadata also marks cpe:2.3:a:nvidia:gpu_driver as vulnerable and cpe:2.3:o:microsoft:windows as not vulnerable.
Official resources
-
CVE-2017-0317 CVE record
CVE.org
-
CVE-2017-0317 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the supplied NVD record on 2017-02-15T23:59:00.400Z. The later modified timestamp (2026-05-13T00:24:29.033Z) reflects a record update, not the original vulnerability date.