Skip to main content

CVE-2025-23263: CWE-279: Incorrect Execution-Assigned Permissions in NVIDIA DOCA-Host and Mellanox OFED

High
VulnerabilityCVE-2025-23263cvecve-2025-23263cwe-279
Published: Thu Jul 17 2025 (07/17/2025, 17:19:50 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DOCA-Host and Mellanox OFED

Description

NVIDIA DOCA-Host and Mellanox OFED contain a vulnerability in the VGT+ feature, where an attacker on a VM might cause escalation of privileges and denial of service on the VLAN.

AI-Powered Analysis

AILast updated: 07/25/2025, 00:36:54 UTC

Technical Analysis

CVE-2025-23263 is a high-severity vulnerability affecting NVIDIA's DOCA-Host and Mellanox OFED software stacks, specifically within the VGT+ feature. The vulnerability is classified under CWE-279, which relates to incorrect execution-assigned permissions. This flaw allows an attacker with limited privileges on a virtual machine (VM) to escalate their privileges and potentially cause a denial of service (DoS) on the VLAN. The vulnerability impacts multiple versions of DOCA-Host prior to 2.5.4-0.0.9, 2.9.3-0.2.2, and 3.0.0-058001, as well as Mellanox OFED versions prior to 5.8-7.0.6.1, 23.10-5.1.4.0, and 24.10-3.2.5.0. The CVSS v3.1 score is 7.6, indicating a high severity level, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact includes low confidentiality loss, high integrity loss, and high availability loss. The vulnerability arises because the VGT+ feature improperly assigns execution permissions, allowing an attacker on a VM to gain unauthorized elevated privileges and disrupt VLAN operations. Although no known exploits are currently in the wild, the potential for privilege escalation and DoS in virtualized environments makes this a critical concern for organizations using these NVIDIA and Mellanox products, especially in cloud and data center infrastructures where virtualized networking is common.

Potential Impact

For European organizations, the impact of CVE-2025-23263 can be significant, particularly for those relying on NVIDIA DOCA-Host and Mellanox OFED in their data centers, cloud infrastructures, or virtualized environments. The vulnerability enables attackers with limited VM access to escalate privileges, potentially compromising the integrity of the host system and disrupting VLAN network availability. This could lead to unauthorized access to sensitive data, disruption of critical services, and broader network instability. Sectors such as finance, telecommunications, healthcare, and government, which often utilize advanced networking and virtualization technologies, could face operational disruptions and data breaches. The denial of service on VLANs could affect multi-tenant environments, impacting multiple customers or departments simultaneously. Given the increasing adoption of virtualized network functions and software-defined networking in Europe, this vulnerability poses a risk to both private enterprises and public sector organizations, potentially undermining trust and compliance with data protection regulations like GDPR if exploited.

Mitigation Recommendations

To mitigate CVE-2025-23263, European organizations should prioritize the following actions: 1) Immediate patching: Apply the latest security updates from NVIDIA and Mellanox as soon as they become available, ensuring all affected versions of DOCA-Host and Mellanox OFED are upgraded beyond the vulnerable releases. 2) Network segmentation: Isolate VMs running vulnerable software from critical network segments to limit the attack surface and reduce the impact of potential privilege escalations. 3) Access controls: Enforce strict access controls and monitoring on VM environments, limiting the number of users with VM-level access and employing role-based access control (RBAC). 4) Monitoring and detection: Deploy advanced intrusion detection and prevention systems (IDS/IPS) capable of identifying anomalous privilege escalation attempts and VLAN disruptions. 5) Harden virtualization environments: Follow best practices for securing hypervisors and virtual network configurations, including disabling unnecessary features and ensuring secure configuration of VGT+ where possible. 6) Incident response readiness: Prepare and test incident response plans specific to virtualization and network layer attacks to ensure rapid containment and remediation if exploitation occurs. 7) Vendor engagement: Maintain communication with NVIDIA and Mellanox for updates on patches and advisories, and participate in security communities to stay informed about emerging threats related to these products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:23.291Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6879335fa83201eaace7af27

Added to database: 7/17/2025, 5:31:11 PM

Last enriched: 7/25/2025, 12:36:54 AM

Last updated: 8/22/2025, 7:01:39 PM

Views: 40

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats