Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23275: CWE-787 Out-of-bounds Write in NVIDIA NVIDIA CUDA Toolkit

0
Medium
VulnerabilityCVE-2025-23275cvecve-2025-23275cwe-787
Published: Wed Sep 24 2025 (09/24/2025, 13:12:29 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA CUDA Toolkit

Description

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvJPEG where a local authenticated user may cause a GPU out-of-bounds write by providing certain image dimensions. A successful exploit of this vulnerability may lead to denial of service and information disclosure.

AI-Powered Analysis

AILast updated: 09/24/2025, 13:29:03 UTC

Technical Analysis

CVE-2025-23275 is a medium-severity vulnerability identified in the NVIDIA CUDA Toolkit, specifically within the nvJPEG component that handles JPEG image processing on GPU platforms. This vulnerability is classified as a CWE-787 Out-of-bounds Write, meaning that the software improperly writes data outside the bounds of allocated memory. The flaw can be triggered by a local authenticated user who provides crafted image dimensions that cause the GPU to perform an out-of-bounds write operation. Such memory corruption can lead to denial of service (DoS) conditions, where the GPU or the host system may crash or become unresponsive, and potentially to information disclosure, where sensitive data in adjacent memory regions could be exposed. The vulnerability affects all versions of the CUDA Toolkit prior to version 13.0 and requires local authentication with low privileges and user interaction to exploit. The CVSS v3.1 base score is 4.2, reflecting a medium severity level, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), user interaction required (UI:R), and impacts on confidentiality, integrity, and availability all rated low (C:L/I:L/A:L). No known exploits are reported in the wild as of the publication date, and no official patches or mitigation links have been provided yet. This vulnerability is particularly relevant for environments using NVIDIA GPUs for CUDA-accelerated image processing tasks, especially those leveraging nvJPEG for JPEG decoding or manipulation on local systems.

Potential Impact

For European organizations, the impact of CVE-2025-23275 depends largely on the extent to which they utilize NVIDIA CUDA Toolkit for GPU-accelerated computing, particularly in image processing or machine learning workloads that involve JPEG images. Organizations in sectors such as research institutions, automotive (e.g., autonomous driving development), healthcare imaging, media and entertainment, and high-performance computing may be affected. The vulnerability could lead to denial of service, disrupting critical GPU-accelerated applications and workflows, potentially causing operational downtime and productivity loss. Information disclosure risks, while rated low, could expose sensitive data processed in GPU memory, which may include proprietary algorithms or confidential image data. Since exploitation requires local authenticated access and user interaction, the threat is more relevant in environments where multiple users share GPU resources or where endpoint security is lax. European organizations with strict data protection regulations (e.g., GDPR) must consider the confidentiality impact, even if low, to avoid compliance issues. The lack of known exploits reduces immediate risk, but the presence of a publicly known vulnerability necessitates timely mitigation to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-23275, European organizations should prioritize upgrading the NVIDIA CUDA Toolkit to version 13.0 or later, where the vulnerability is addressed. Until an official patch is available, organizations should implement strict access controls to limit local authenticated user access to systems with NVIDIA GPUs running CUDA workloads. Enforce the principle of least privilege to reduce the number of users who can interact with GPU-accelerated applications. Employ endpoint security solutions that monitor for anomalous GPU usage or suspicious image processing activities. Additionally, validate and sanitize all image inputs rigorously before processing to prevent malformed image dimensions from triggering the vulnerability. Organizations should also consider isolating GPU workloads in containerized or virtualized environments to contain potential impacts. Regularly audit and monitor GPU driver and CUDA Toolkit versions across the infrastructure to ensure timely updates. Finally, maintain awareness of NVIDIA security advisories for any forthcoming patches or mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:24.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d3f06c37fc381b138d530e

Added to database: 9/24/2025, 1:21:48 PM

Last enriched: 9/24/2025, 1:29:03 PM

Last updated: 10/7/2025, 1:41:13 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats