Skip to main content

CVE-2025-23312: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

High
VulnerabilityCVE-2025-23312cvecve-2025-23312cwe-94
Published: Tue Aug 26 2025 (08/26/2025, 18:29:30 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework for all platforms contains a vulnerability in the retrieval services component, where malicious data created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:14:46 UTC

Technical Analysis

CVE-2025-23312 is a high-severity vulnerability identified in the NVIDIA NeMo Framework, a toolkit designed for building conversational AI models. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, the flaw exists in the retrieval services component of the NeMo Framework across all platforms and affects all versions prior to 2.4.0. An attacker can craft malicious input data that, when processed by the vulnerable component, leads to arbitrary code injection. This can result in the execution of attacker-controlled code within the context of the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Successful exploitation could allow an attacker to escalate privileges, disclose sensitive information, and tamper with data, severely compromising the affected system's security and trustworthiness. No known exploits are currently reported in the wild, and no official patches have been linked yet, emphasizing the need for vigilance and prompt remediation once updates become available.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those leveraging NVIDIA's NeMo Framework in AI-driven applications, research, or production environments. The ability to execute arbitrary code locally with low privileges and no user interaction means that insider threats or attackers who have gained limited access could escalate their control, potentially leading to data breaches involving sensitive personal or corporate data. This is particularly critical in sectors such as finance, healthcare, and critical infrastructure, where AI models may process confidential information. Additionally, data tampering could undermine the integrity of AI models, leading to erroneous outputs or decisions, which could have downstream effects on automated processes and decision-making systems. The high impact on confidentiality, integrity, and availability means that exploitation could disrupt business operations, damage reputations, and lead to regulatory non-compliance under frameworks like GDPR.

Mitigation Recommendations

European organizations should prioritize upgrading the NVIDIA NeMo Framework to version 2.4.0 or later as soon as it becomes available to address this vulnerability. Until patches are released, organizations should implement strict access controls to limit local access to systems running the NeMo Framework, ensuring that only trusted and authorized personnel can interact with these environments. Employing application whitelisting and runtime application self-protection (RASP) can help detect and prevent unauthorized code execution attempts. Monitoring and logging of retrieval service component activities should be enhanced to detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should conduct thorough code reviews and input validation on any data fed into the retrieval services to minimize the risk of malicious input triggering code injection. Network segmentation can also reduce the risk of lateral movement if exploitation occurs. Finally, organizations should stay informed through NVIDIA security advisories and subscribe to vulnerability notification services to respond promptly when patches or further guidance are issued.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:28.098Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ae0155ad5a09ad005ac220

Added to database: 8/26/2025, 6:47:49 PM

Last enriched: 9/3/2025, 1:14:46 AM

Last updated: 9/4/2025, 10:24:29 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats