Skip to main content

CVE-2025-23287: CWE-497 in NVIDIA GPU Display Drivers

Low
VulnerabilityCVE-2025-23287cvecve-2025-23287cwe-497
Published: Sat Aug 02 2025 (08/02/2025, 22:10:01 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Drivers

Description

NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.

AI-Powered Analysis

AILast updated: 08/10/2025, 00:59:46 UTC

Technical Analysis

CVE-2025-23287 is a security vulnerability identified in NVIDIA GPU Display Drivers for Windows, specifically affecting versions R535, R570, and R575. The vulnerability is categorized under CWE-497, which relates to the exposure of sensitive information to an unauthorized actor. In this case, an attacker with limited privileges (requiring local access and low privileges) can exploit this flaw to gain access to sensitive system-level information through the GPU display driver. The vulnerability does not require user interaction and has a low complexity of attack (AC:L), but it does require local access (AV:L) and some privileges (PR:L). The impact is limited to confidentiality, with no direct effect on system integrity or availability. The CVSS v3.1 base score is 3.3, indicating a low severity level. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability could potentially allow an attacker to gather information that might be leveraged in further attacks or reconnaissance, but it does not directly enable code execution or system compromise.

Potential Impact

For European organizations, the primary impact of CVE-2025-23287 is the potential leakage of sensitive system information on Windows machines using affected NVIDIA GPU drivers. This could aid attackers in mapping system configurations or identifying further vulnerabilities, especially in environments where GPUs are used for high-performance computing, visualization, or AI workloads. While the direct risk is low, organizations handling sensitive data or operating in regulated sectors (e.g., finance, healthcare, critical infrastructure) should consider the risk of information disclosure as part of their broader security posture. The vulnerability's requirement for local access limits remote exploitation, reducing the risk of widespread attacks. However, insider threats or attackers who have gained initial footholds could exploit this vulnerability to escalate their knowledge about the system environment, potentially facilitating lateral movement or privilege escalation in complex networks.

Mitigation Recommendations

To mitigate CVE-2025-23287, European organizations should prioritize the following actions: 1) Monitor NVIDIA's official channels for patches or driver updates addressing this vulnerability and apply them promptly once available. 2) Restrict local access to systems with affected NVIDIA GPU drivers by enforcing strict access controls and endpoint security policies, limiting the number of users with local privileges. 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect unusual local activities that might indicate exploitation attempts. 4) Conduct regular audits of installed GPU driver versions across the enterprise to identify and remediate vulnerable instances. 5) Educate users and administrators about the risks of local privilege misuse and enforce the principle of least privilege to minimize the attack surface. 6) In environments where GPUs are critical, consider network segmentation and enhanced monitoring to detect lateral movement attempts that might leverage information gained through this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:25.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688e8e84ad5a09ad00d658e8

Added to database: 8/2/2025, 10:17:40 PM

Last enriched: 8/10/2025, 12:59:46 AM

Last updated: 9/15/2025, 10:03:06 AM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats