Skip to main content

CVE-2025-23297: CWE-276 Incorrect Default Permissions in NVIDIA NVIDIA App

High
VulnerabilityCVE-2025-23297cvecve-2025-23297cwe-276
Published: Wed Oct 01 2025 (10/01/2025, 21:19:43 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA App

Description

NVIDIA Installer for NvAPP for Windows contains a vulnerability in the FrameviewSDK installation process, where an attacker with local unprivileged access could modify files in the Frameview SDK directory. A successful exploit of this vulnerability might lead to escalation of privileges.

AI-Powered Analysis

AILast updated: 10/01/2025, 21:30:21 UTC

Technical Analysis

CVE-2025-23297 is a high-severity vulnerability affecting the NVIDIA Installer for NvAPP on Windows systems, specifically within the FrameviewSDK installation process. The root cause is incorrect default permissions (CWE-276) set on files or directories related to the Frameview SDK. This misconfiguration allows a local attacker with unprivileged access to modify files within the Frameview SDK directory. By altering these files, an attacker could escalate their privileges on the affected system, potentially gaining administrative or SYSTEM-level access. The vulnerability impacts all versions of the NVIDIA App prior to 11.0.5.245. The CVSS 3.1 base score is 7.8, reflecting a high severity due to the combination of local attack vector, low attack complexity, required privileges, and the absence of user interaction. The impact on confidentiality, integrity, and availability is rated high, indicating that exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no patches or updates have been linked yet, suggesting that organizations should prioritize mitigation and monitoring. The vulnerability is specific to Windows platforms where the NVIDIA App and FrameviewSDK are installed, typically on systems with NVIDIA graphics hardware. The threat is particularly relevant for environments where multiple users have local access or where endpoint security is lax, as local unprivileged users could leverage this flaw to gain elevated rights.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying heavily on NVIDIA hardware and software, such as technology companies, research institutions, media production, and gaming industries. The ability for a local attacker to escalate privileges could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within corporate networks. In environments with shared workstations or insufficient endpoint protection, attackers could exploit this flaw to implant persistent malware or conduct espionage. The high impact on confidentiality, integrity, and availability means that compromised systems could be used to exfiltrate data, modify critical files, or disrupt operations. Given the widespread use of NVIDIA GPUs in European data centers and workstations, the vulnerability could affect a broad range of organizations, increasing the risk of targeted attacks or insider threats. Additionally, the lack of known exploits in the wild currently provides a window for proactive defense, but organizations should not underestimate the potential for rapid exploitation once public details are widely disseminated.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit the permissions of the Frameview SDK directories and files on all Windows systems with NVIDIA App installations. Restrict write permissions strictly to administrative accounts and remove any unnecessary access for unprivileged users. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor for unauthorized file modifications in the Frameview SDK path. Organizations should also enforce the principle of least privilege for all local users and consider isolating systems with NVIDIA software from untrusted users. Until an official patch is released, consider disabling or uninstalling the NVIDIA App or FrameviewSDK components if they are not essential. Regularly review NVIDIA’s security advisories for updates or patches addressing this issue. Additionally, enhance local user activity logging and monitor for suspicious privilege escalation attempts. Conduct user awareness training to reduce the risk of local threat actors exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:26.349Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dd9c8d82ee871e1bdf1d3a

Added to database: 10/1/2025, 9:26:37 PM

Last enriched: 10/1/2025, 9:30:21 PM

Last updated: 10/2/2025, 4:17:54 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats