Skip to main content

CVE-2025-23270: CWE-392: Missing Report of Error Condition in NVIDIA Jetson Orin, IGX Orin and Xavier Devices

High
VulnerabilityCVE-2025-23270cvecve-2025-23270cwe-392
Published: Thu Jul 17 2025 (07/17/2025, 19:59:24 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Jetson Orin, IGX Orin and Xavier Devices

Description

NVIDIA Jetson Linux contains a vulnerability in UEFI Management mode, where an unprivileged local attacker may cause exposure of sensitive information via a side channel vulnerability. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, and information disclosure.

AI-Powered Analysis

AILast updated: 07/17/2025, 20:31:12 UTC

Technical Analysis

CVE-2025-23270 is a high-severity vulnerability affecting NVIDIA Jetson Orin, IGX Orin, and Xavier devices running Jetson Linux. The flaw exists in the UEFI Management mode, where an unprivileged local attacker can exploit a side channel vulnerability due to missing error condition reporting (CWE-392). This vulnerability allows an attacker without privileges or user interaction to potentially gain access to sensitive information through side channel analysis. Successful exploitation could lead to severe consequences including code execution, data tampering, denial of service, and information disclosure. The vulnerability affects multiple versions of Jetson Orin Series (prior to JP5.x: 35.6.2 and JP6.x: 36.4.4), Xavier Series (prior to JP5.x: 35.6.2), and IGX Orin (prior to IGX 1.1.2). The CVSS v3.1 score is 7.1, indicating high severity, with an attack vector of physical/local (AV:P), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability stems from improper error handling in UEFI management, which can be leveraged for side channel attacks, a sophisticated technique that can leak sensitive data or allow further compromise of the system.

Potential Impact

For European organizations using NVIDIA Jetson Orin, IGX Orin, or Xavier devices, especially in critical infrastructure, industrial automation, robotics, or AI edge computing deployments, this vulnerability poses a significant risk. The ability for an unprivileged local attacker to execute code or tamper with data could lead to operational disruptions, data breaches, or sabotage. Given the high confidentiality, integrity, and availability impact, organizations could face intellectual property theft, loss of control over embedded systems, and downtime. The side channel nature of the attack means that even indirect information leakage could be exploited to escalate attacks. Since these devices are often deployed in environments requiring high reliability and security, such as manufacturing plants, automotive systems, or smart city infrastructure, the impact could extend to safety-critical scenarios. The lack of known exploits currently provides a window for mitigation, but the high severity demands prompt attention.

Mitigation Recommendations

European organizations should immediately inventory their use of NVIDIA Jetson Orin, IGX Orin, and Xavier devices to identify affected versions. Until official patches are released, organizations should restrict physical and local access to these devices to trusted personnel only, as the attack requires local access. Implement strict access controls and monitoring around these devices to detect any anomalous behavior indicative of exploitation attempts. Employ hardware security modules or trusted platform modules (TPMs) where possible to enhance device integrity. Regularly check NVIDIA’s security advisories for patch releases and apply updates promptly once available. Additionally, consider network segmentation to isolate vulnerable devices from critical network segments to limit potential lateral movement. Conduct security awareness training for staff managing these devices to recognize and report suspicious activity. Finally, implement comprehensive logging and incident response plans tailored to embedded device environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:23.292Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68795a0ca83201eaace8b89d

Added to database: 7/17/2025, 8:16:12 PM

Last enriched: 7/17/2025, 8:31:12 PM

Last updated: 8/25/2025, 2:49:49 AM

Views: 50

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats