Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23312: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-23312cvecve-2025-23312cwe-94
Published: Tue Aug 26 2025 (08/26/2025, 18:29:30 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework for all platforms contains a vulnerability in the retrieval services component, where malicious data created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:14:46 UTC

Technical Analysis

CVE-2025-23312 is a high-severity vulnerability identified in the NVIDIA NeMo Framework, a toolkit designed for building conversational AI models. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, the flaw exists in the retrieval services component of the NeMo Framework across all platforms and affects all versions prior to 2.4.0. An attacker can craft malicious input data that, when processed by the vulnerable component, leads to arbitrary code injection. This can result in the execution of attacker-controlled code within the context of the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Successful exploitation could allow an attacker to escalate privileges, disclose sensitive information, and tamper with data, severely compromising the affected system's security and trustworthiness. No known exploits are currently reported in the wild, and no official patches have been linked yet, emphasizing the need for vigilance and prompt remediation once updates become available.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those leveraging NVIDIA's NeMo Framework in AI-driven applications, research, or production environments. The ability to execute arbitrary code locally with low privileges and no user interaction means that insider threats or attackers who have gained limited access could escalate their control, potentially leading to data breaches involving sensitive personal or corporate data. This is particularly critical in sectors such as finance, healthcare, and critical infrastructure, where AI models may process confidential information. Additionally, data tampering could undermine the integrity of AI models, leading to erroneous outputs or decisions, which could have downstream effects on automated processes and decision-making systems. The high impact on confidentiality, integrity, and availability means that exploitation could disrupt business operations, damage reputations, and lead to regulatory non-compliance under frameworks like GDPR.

Mitigation Recommendations

European organizations should prioritize upgrading the NVIDIA NeMo Framework to version 2.4.0 or later as soon as it becomes available to address this vulnerability. Until patches are released, organizations should implement strict access controls to limit local access to systems running the NeMo Framework, ensuring that only trusted and authorized personnel can interact with these environments. Employing application whitelisting and runtime application self-protection (RASP) can help detect and prevent unauthorized code execution attempts. Monitoring and logging of retrieval service component activities should be enhanced to detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should conduct thorough code reviews and input validation on any data fed into the retrieval services to minimize the risk of malicious input triggering code injection. Network segmentation can also reduce the risk of lateral movement if exploitation occurs. Finally, organizations should stay informed through NVIDIA security advisories and subscribe to vulnerability notification services to respond promptly when patches or further guidance are issued.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:28.098Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ae0155ad5a09ad005ac220

Added to database: 8/26/2025, 6:47:49 PM

Last enriched: 9/3/2025, 1:14:46 AM

Last updated: 10/20/2025, 4:08:34 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats