Skip to main content

CVE-2025-23321: CWE-369 Divide By Zero in NVIDIA Triton Inference Server

High
VulnerabilityCVE-2025-23321cvecve-2025-23321cwe-369
Published: Wed Aug 06 2025 (08/06/2025, 12:38:35 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Triton Inference Server

Description

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero issue by issuing an invalid request. A successful exploit of this vulnerability might lead to denial of service.

AI-Powered Analysis

AILast updated: 08/06/2025, 13:19:07 UTC

Technical Analysis

CVE-2025-23321 is a high-severity vulnerability identified in the NVIDIA Triton Inference Server, a widely used platform for deploying AI models in production environments on both Windows and Linux operating systems. The vulnerability is classified under CWE-369 (Divide By Zero), indicating that the flaw arises when the server processes an invalid request that causes a division by zero operation. This results in a denial of service (DoS) condition, where the server becomes unresponsive or crashes, disrupting AI inference services. The vulnerability affects all versions of the Triton Inference Server prior to version 25.07. The CVSS 3.1 base score of 7.5 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, but the ease of exploitation and the critical role of Triton in AI workloads make this a significant threat. The lack of a patch at the time of publication necessitates immediate attention from organizations using affected versions to prevent potential service disruptions.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on NVIDIA Triton Inference Server for AI-driven applications such as healthcare diagnostics, autonomous vehicles, financial modeling, and industrial automation. A successful exploit could lead to denial of service, causing interruption of critical AI inference tasks, resulting in operational downtime, loss of productivity, and potential financial losses. In sectors like healthcare or transportation, such disruptions could have safety implications or degrade service quality. Additionally, the availability of AI services is often integral to customer-facing applications, so outages could damage reputation and customer trust. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely, but the service unavailability itself poses a significant risk to business continuity.

Mitigation Recommendations

European organizations should prioritize upgrading to NVIDIA Triton Inference Server version 25.07 or later as soon as it becomes available, as this version addresses the divide by zero vulnerability. Until the patch is applied, organizations should implement network-level protections such as strict input validation and filtering to block malformed or suspicious requests targeting the inference server. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect anomalous request patterns can reduce exposure. Monitoring server logs for unusual request errors or crashes can provide early warning signs of exploitation attempts. Additionally, isolating the Triton server within segmented network zones and restricting access to trusted clients only will limit the attack surface. Organizations should also prepare incident response plans to quickly recover from potential denial of service events, including failover strategies and backup inference capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:28.099Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68935279ad5a09ad00f16544

Added to database: 8/6/2025, 1:02:49 PM

Last enriched: 8/6/2025, 1:19:07 PM

Last updated: 8/24/2025, 4:54:17 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats