Skip to main content

CVE-2025-23287: CWE-497 in NVIDIA GPU Display Drivers

Low
VulnerabilityCVE-2025-23287cvecve-2025-23287cwe-497
Published: Sat Aug 02 2025 (08/02/2025, 22:10:01 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GPU Display Drivers

Description

NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.

AI-Powered Analysis

AILast updated: 08/02/2025, 22:34:03 UTC

Technical Analysis

CVE-2025-23287 is a vulnerability identified in NVIDIA GPU Display Drivers for Windows, specifically affecting versions R535, R570, and R575. The vulnerability is classified under CWE-497, which relates to Exposure of Sensitive Information to an Unauthorized Actor. This flaw allows an attacker with limited privileges (local access with low privileges) to gain access to sensitive system-level information through the GPU display driver. The vulnerability does not require user interaction and has a low complexity of attack, but it is limited to local access, meaning the attacker must already have some level of access to the system. The CVSS v3.1 base score is 3.3, indicating a low severity level primarily due to the limited impact and attack vector. The vulnerability impacts confidentiality but does not affect integrity or availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The issue could potentially allow attackers to gather sensitive information that might be leveraged for further attacks or privilege escalation, but by itself, it does not directly compromise system integrity or availability.

Potential Impact

For European organizations, the primary impact of CVE-2025-23287 is the potential exposure of sensitive system-level information on Windows machines using affected NVIDIA GPU drivers. While the vulnerability is low severity and requires local access, it could be exploited by insiders or malware that has already gained limited access to a system. This could facilitate reconnaissance activities or aid in lateral movement within corporate networks. Organizations in sectors with high security requirements, such as finance, government, and critical infrastructure, may find this information disclosure particularly concerning as it could reveal system configurations or security settings. However, since the vulnerability does not allow remote exploitation or direct system compromise, the immediate risk is limited. Still, it underscores the importance of maintaining strict access controls and monitoring on endpoints with NVIDIA GPUs. The lack of a patch at the time of disclosure means organizations must rely on compensating controls until an update is available.

Mitigation Recommendations

1. Restrict local access to systems with affected NVIDIA GPU drivers to trusted users only, minimizing the risk of exploitation by unauthorized actors. 2. Implement strict endpoint security controls, including application whitelisting and behavior monitoring, to detect and prevent unauthorized local activities. 3. Monitor systems for unusual access patterns or attempts to query GPU driver information that could indicate reconnaissance. 4. Keep systems up to date with the latest Windows security patches and NVIDIA driver updates; apply the official NVIDIA patch promptly once released. 5. Use least privilege principles to limit user permissions, reducing the likelihood that an attacker can exploit this vulnerability. 6. Employ network segmentation to limit lateral movement opportunities if an attacker gains local access. 7. Conduct regular security awareness training to reduce insider threats and accidental misuse of systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:25.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688e8e84ad5a09ad00d658e8

Added to database: 8/2/2025, 10:17:40 PM

Last enriched: 8/2/2025, 10:34:03 PM

Last updated: 8/3/2025, 12:37:23 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats