Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23297: CWE-276 Incorrect Default Permissions in NVIDIA NVIDIA App

0
High
VulnerabilityCVE-2025-23297cvecve-2025-23297cwe-276
Published: Wed Oct 01 2025 (10/01/2025, 21:19:43 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA App

Description

NVIDIA Installer for NvAPP for Windows contains a vulnerability in the FrameviewSDK installation process, where an attacker with local unprivileged access could modify files in the Frameview SDK directory. A successful exploit of this vulnerability might lead to escalation of privileges.

AI-Powered Analysis

AILast updated: 10/08/2025, 22:17:26 UTC

Technical Analysis

CVE-2025-23297 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in the NVIDIA Installer for NvAPP on Windows platforms. The flaw resides in the FrameviewSDK installation process, where the installer sets insecure default permissions on the Frameview SDK directory. This misconfiguration allows a local attacker with limited privileges to modify files within this directory. Since the Frameview SDK is part of NVIDIA's software suite used for performance monitoring and GPU management, unauthorized modifications could lead to privilege escalation, enabling the attacker to execute code with elevated rights. The vulnerability affects all versions prior to 11.0.5.245. The CVSS 3.1 base score is 7.8, reflecting a high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction needed. The impact covers confidentiality, integrity, and availability, as the attacker could alter critical files to gain control or disrupt system operations. Although no exploits have been reported in the wild, the vulnerability's nature makes it a significant risk in environments where local user access is possible. The lack of a patch link suggests that a fix might be pending or recently released. Organizations using NVIDIA App on Windows should prioritize remediation to prevent potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-23297 can be substantial, particularly in sectors such as technology, research, finance, and manufacturing where NVIDIA GPUs and related software are widely used for computational tasks. An attacker exploiting this vulnerability could escalate privileges from a local unprivileged user to higher system levels, potentially gaining administrative control. This could lead to unauthorized access to sensitive data, disruption of critical services, or deployment of further malware. The vulnerability threatens the confidentiality, integrity, and availability of affected systems. In multi-user environments or shared workstations, the risk is amplified as any local user could exploit the flaw. Additionally, organizations with remote desktop or virtual desktop infrastructure might face increased exposure if local user isolation is weak. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of mitigation.

Mitigation Recommendations

1. Apply the official NVIDIA update to version 11.0.5.245 or later as soon as it becomes available to correct the default permissions issue. 2. Until patches are deployed, restrict local user access on systems running the NVIDIA App, especially limiting write permissions to the Frameview SDK directory. 3. Employ application whitelisting and integrity monitoring tools to detect unauthorized changes in the Frameview SDK directory. 4. Harden endpoint security configurations by enforcing least privilege principles and disabling unnecessary local accounts. 5. Monitor system logs for suspicious file modifications or privilege escalation attempts related to NVIDIA software components. 6. Educate IT staff and users about the risks of local privilege escalation and ensure rapid incident response capabilities. 7. For virtualized or shared environments, enforce strict user session isolation and consider additional sandboxing of NVIDIA-related processes. 8. Coordinate with NVIDIA support channels for timely information on patches and advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:26.349Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dd9c8d82ee871e1bdf1d3a

Added to database: 10/1/2025, 9:26:37 PM

Last enriched: 10/8/2025, 10:17:26 PM

Last updated: 11/17/2025, 11:01:39 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats