Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23279: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in NVIDIA GPU Display Drivers

0
High
VulnerabilityCVE-2025-23279cvecve-2025-23279cwe-367
Published: Sat Aug 02 2025 (08/02/2025, 22:06:27 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Drivers

Description

NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:59:35 UTC

Technical Analysis

CVE-2025-23279 is a vulnerability categorized under CWE-367, a Time-of-check to Time-of-use (TOCTOU) race condition, affecting NVIDIA GPU Display Drivers installed via the .run installer on Linux and Solaris platforms. The issue arises when the software performs a security check on a resource or condition and then uses that resource without revalidating it, allowing an attacker to manipulate the state between these operations. This race condition can be exploited by a local attacker with limited privileges to escalate their privileges to a higher level, potentially root or system-level. The attacker could leverage this to execute arbitrary code with elevated privileges, disclose sensitive information, cause denial of service by disrupting driver functionality, or tamper with data. The vulnerability affects the R575 driver version and was publicly disclosed in August 2025. The CVSS v3.1 score is 7.0, indicating high severity, with the vector indicating local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or exploits are currently publicly available, but the risk remains significant due to the potential impact and the critical role of GPU drivers in system operation.

Potential Impact

The exploitation of this vulnerability can have severe consequences for organizations relying on NVIDIA GPU drivers on Linux and Solaris systems. Privilege escalation can allow attackers to gain root or system-level access, bypassing security controls and potentially compromising the entire system. This can lead to unauthorized code execution, enabling attackers to install persistent malware, steal sensitive data, or disrupt operations. Information disclosure could expose confidential data, while denial of service could impact critical workloads dependent on GPU acceleration, such as scientific computing, AI/ML workloads, or graphical applications. Data tampering risks integrity of stored or processed information. Given the widespread use of NVIDIA GPUs in enterprise, research, and cloud environments, the vulnerability poses a significant risk to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

Organizations should monitor NVIDIA's official channels for patches addressing CVE-2025-23279 and apply updates promptly once available. Until patches are released, limit access to systems running vulnerable NVIDIA drivers to trusted users only, enforcing strict local user privilege management and minimizing the number of users with local access. Employ mandatory access controls (e.g., SELinux, AppArmor) to restrict the NVIDIA installer and driver processes from performing unauthorized operations. Use file system permissions and integrity monitoring to detect and prevent unauthorized modifications to driver files. Consider isolating critical GPU-accelerated workloads in containers or virtual machines to reduce attack surface. Regularly audit system logs for suspicious activity related to driver installation or execution. Additionally, educate system administrators about the risks of race condition exploits and the importance of timely patching in GPU driver environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:24.333Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688e8e84ad5a09ad00d658dc

Added to database: 8/2/2025, 10:17:40 PM

Last enriched: 2/27/2026, 12:59:35 AM

Last updated: 3/25/2026, 1:47:55 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses