Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23283: CWE-121 in NVIDIA GPU Display Drivers

0
High
VulnerabilityCVE-2025-23283cvecve-2025-23283cwe-121
Published: Sat Aug 02 2025 (08/02/2025, 22:13:17 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Drivers

Description

NVIDIA vGPU software for Linux-style hypervisors contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:00:44 UTC

Technical Analysis

CVE-2025-23283 is a stack-based buffer overflow vulnerability classified under CWE-121, found in NVIDIA's Virtual GPU (vGPU) Manager software for Linux-style hypervisors. This vulnerability affects specific versions of NVIDIA GPU Display Drivers (R535 and R570). The flaw arises when a malicious guest virtual machine interacts with the Virtual GPU Manager, causing a stack buffer overflow due to improper bounds checking or insufficient input validation. This memory corruption can allow the attacker to execute arbitrary code within the host hypervisor context, potentially leading to full host compromise. The vulnerability impacts confidentiality, integrity, and availability by enabling code execution, denial of service, privilege escalation, information disclosure, and data tampering. The CVSS v3.1 score is 7.8 (high severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), and low privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits are known yet, but the vulnerability is critical for environments using NVIDIA vGPU technology, especially in cloud and virtualized data centers where multiple tenants share GPU resources.

Potential Impact

The vulnerability poses a severe risk to organizations deploying NVIDIA vGPU technology in virtualized environments, including cloud service providers, enterprises with private clouds, and research institutions using GPU-accelerated virtual machines. Successful exploitation could allow a malicious guest VM to escape isolation, execute arbitrary code on the host hypervisor, and compromise other guest VMs or the host system. This could lead to data breaches, service outages, and unauthorized access to sensitive information. The high impact on confidentiality, integrity, and availability means critical workloads relying on GPU acceleration could be disrupted or manipulated. Additionally, the ability to escalate privileges and tamper with data could facilitate further lateral movement and persistent threats within affected networks. The lack of known exploits currently provides a window for proactive mitigation, but the risk remains significant given the widespread use of NVIDIA GPUs in cloud infrastructure worldwide.

Mitigation Recommendations

Organizations should immediately inventory their use of NVIDIA vGPU software and identify systems running affected driver versions R535 and R570. Although no patches are currently linked, they should monitor NVIDIA security advisories closely and apply updates as soon as they are released. In the interim, restrict guest VM privileges to the minimum necessary to reduce the risk of exploitation. Implement strict access controls and network segmentation to isolate virtual machines and limit potential lateral movement. Employ runtime protection and monitoring tools to detect anomalous behavior indicative of exploitation attempts. Consider disabling or limiting vGPU features if feasible until patched versions are deployed. Additionally, conduct regular security assessments and penetration testing focused on virtualization layers to identify and remediate similar vulnerabilities proactively. Maintain up-to-date backups and incident response plans tailored to hypervisor and GPU virtualization environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:25.307Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688e8e84ad5a09ad00d658e2

Added to database: 8/2/2025, 10:17:40 PM

Last enriched: 2/27/2026, 1:00:44 AM

Last updated: 3/25/2026, 5:40:12 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses