Skip to main content

CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300

Medium
VulnerabilityCVE-2025-23337cvecve-2025-23337cwe-1244
Published: Wed Sep 17 2025 (09/17/2025, 22:27:15 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: HGX GB200, HGX GB300, HGC B300

Description

NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:11:34 UTC

Technical Analysis

CVE-2025-23337 is a medium severity vulnerability affecting NVIDIA's HGX and DGX series products, specifically the HGX GB200 (version 1.2), HGX GB300 (0.8 dev drop), and HGC B300 (0.6). The vulnerability resides in the HGX Management Controller (HMC), a critical component responsible for managing and monitoring the hardware platform. The flaw allows a malicious actor who already has administrative access to the Baseboard Management Controller (BMC) to escalate privileges and gain administrative access to the HMC. This access can lead to multiple severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation, information disclosure, and data tampering. The CVSS v3.1 score of 6.7 reflects a medium severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues within management controllers. Although no known exploits are currently in the wild and no patches have been released yet, the vulnerability poses a significant risk in environments where administrative access to the BMC is possible, potentially allowing attackers to compromise the management infrastructure of high-performance computing platforms. These platforms are often used in data centers, research institutions, and enterprises requiring advanced GPU computing capabilities.

Potential Impact

For European organizations, especially those operating data centers, research facilities, or enterprises leveraging NVIDIA HGX and DGX platforms for AI, machine learning, or high-performance computing workloads, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized control over critical management components, enabling attackers to disrupt operations via denial of service, manipulate sensitive data, or execute arbitrary code that could compromise the confidentiality and integrity of intellectual property or sensitive computations. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and loss of trust. The requirement for administrative BMC access limits the attack surface but does not eliminate risk, as insider threats or lateral movement within compromised networks could enable exploitation. The absence of patches means organizations must rely on compensating controls until updates are available. The vulnerability could also affect supply chain security if compromised management controllers are used in multi-tenant or cloud environments, potentially impacting multiple customers.

Mitigation Recommendations

1. Restrict and tightly control administrative access to the Baseboard Management Controller (BMC) interfaces, ensuring only trusted personnel have such privileges. 2. Implement network segmentation and access controls to isolate management interfaces from general network traffic, reducing the risk of unauthorized access. 3. Monitor and audit all administrative access to BMC and HMC components for unusual or unauthorized activities, employing anomaly detection where possible. 4. Employ strong authentication mechanisms (e.g., multi-factor authentication) for accessing management controllers to reduce risk of credential compromise. 5. Until official patches are released, consider disabling or limiting remote management features if feasible, or use VPNs and encrypted channels to secure management traffic. 6. Maintain up-to-date inventory of affected NVIDIA hardware and firmware versions to prioritize risk assessment and remediation planning. 7. Engage with NVIDIA support channels for early notification of patches or workarounds and apply updates promptly once available. 8. Conduct penetration testing and vulnerability assessments focused on management controllers to identify potential exploitation paths within the environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cb4e05e5fa2c8b1490b359

Added to database: 9/18/2025, 12:10:45 AM

Last enriched: 9/18/2025, 12:11:34 AM

Last updated: 9/18/2025, 12:11:34 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats