Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23276: CWE-552 Files or Directories Accessible to External Parties in NVIDIA GPU Display Drivers

0
High
VulnerabilityCVE-2025-23276cvecve-2025-23276cwe-552
Published: Sat Aug 02 2025 (08/02/2025, 22:01:47 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Drivers

Description

NVIDIA Installer for Windows contains a vulnerability where an attacker may be able to escalate privileges. A successful exploit of this vulnerability may lead to escalation of privileges, denial of service, code execution, information disclosure and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:59:09 UTC

Technical Analysis

CVE-2025-23276 is a vulnerability identified in NVIDIA's GPU Display Drivers for Windows, specifically affecting versions R535, R570, and R575. The root cause is related to CWE-552, which involves files or directories being accessible to external parties improperly. This vulnerability resides in the NVIDIA Installer component, allowing an attacker with low-level privileges on the system to escalate their privileges without requiring user interaction. The vulnerability can be exploited locally (AV:L) with low attack complexity (AC:L) and requires some privileges (PR:L) but no user interaction (UI:N). Successful exploitation can lead to a range of severe impacts including privilege escalation, arbitrary code execution, denial of service, information disclosure, and data tampering. The scope of the vulnerability is unchanged (S:U), meaning the impact is confined to the vulnerable component and does not extend beyond the security boundary. Although no exploits have been reported in the wild yet, the high CVSS score of 7.8 indicates a significant risk. The vulnerability was reserved in January 2025 and published in August 2025, indicating recent discovery and disclosure. The lack of available patches at the time of reporting emphasizes the need for immediate mitigation measures. This vulnerability is particularly concerning because NVIDIA GPU drivers are widely deployed in consumer, enterprise, and data center environments, making the attack surface large and diverse.

Potential Impact

The potential impact of CVE-2025-23276 is substantial for organizations worldwide that utilize NVIDIA GPU Display Drivers on Windows systems. Privilege escalation vulnerabilities allow attackers to gain higher-level access than intended, potentially leading to full system compromise. This can result in unauthorized code execution, allowing attackers to install malware, manipulate system configurations, or exfiltrate sensitive data. Denial of service conditions could disrupt critical services, especially in environments relying on GPU acceleration for workloads such as AI, scientific computing, and graphics rendering. Information disclosure and data tampering further threaten confidentiality and integrity of organizational data. Since the vulnerability requires only low privileges and no user interaction, insider threats or malware with limited access could exploit this flaw to escalate privileges rapidly. The widespread use of NVIDIA drivers in both consumer and enterprise markets increases the scope of affected systems, potentially impacting sectors such as finance, healthcare, government, and technology. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention to prevent future exploitation.

Mitigation Recommendations

1. Monitor NVIDIA's official channels closely for the release of security patches addressing CVE-2025-23276 and apply them immediately upon availability. 2. Until patches are available, restrict local access to systems with affected NVIDIA GPU drivers by enforcing strict user account controls and limiting administrative privileges. 3. Employ application whitelisting and endpoint protection solutions to detect and block unauthorized attempts to exploit the installer or related components. 4. Audit and monitor file system permissions related to NVIDIA installer directories and files to ensure they are not accessible by unprivileged users. 5. Implement robust logging and alerting mechanisms to detect suspicious activities indicative of privilege escalation attempts. 6. In environments where GPU drivers are critical, consider isolating affected systems or using virtualization/containerization to limit potential impact. 7. Educate system administrators and users about the risks of local privilege escalation vulnerabilities and the importance of maintaining updated software. 8. Review and harden group policies and local security policies to minimize the attack surface related to installer execution and file access. These targeted measures go beyond generic patching advice by focusing on access control, monitoring, and proactive defense until official fixes are deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:24.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688e8e84ad5a09ad00d658ee

Added to database: 8/2/2025, 10:17:40 PM

Last enriched: 2/27/2026, 12:59:09 AM

Last updated: 3/24/2026, 10:05:09 PM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses