CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300
NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI Analysis
Technical Summary
CVE-2025-23337 is a vulnerability identified in the HGX Management Controller (HMC) component of NVIDIA's HGX and DGX server platforms, specifically models GB200, GB300, and B300. The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues. The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access to the HMC, effectively gaining administrative control over this critical management component. The HMC is responsible for managing hardware resources and system operations in these high-performance computing platforms. Exploiting this vulnerability can enable the attacker to execute arbitrary code, cause denial of service conditions, escalate privileges further, disclose sensitive information, and tamper with data. The CVSS v3.1 score is 6.7, indicating a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects specific versions: GB200 1.2, GB300 0.8 dev drop, and B300 0.6. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risk of lateral movement and privilege escalation within the management infrastructure of NVIDIA's high-performance computing systems.
Potential Impact
The impact of CVE-2025-23337 is significant for organizations deploying NVIDIA HGX and DGX platforms, especially in data centers, research institutions, and enterprises relying on these systems for AI, machine learning, and high-performance computing workloads. Successful exploitation can lead to full administrative control over the HMC, allowing attackers to manipulate hardware management functions, disrupt operations through denial of service, execute arbitrary code potentially leading to persistent compromise, and access or alter sensitive data. This can undermine system integrity, availability, and confidentiality, potentially causing operational downtime, data breaches, and loss of trust. Since the vulnerability requires administrative access to the BMC, the risk is heightened in environments where BMC access controls are weak or compromised. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2025-23337, organizations should implement strict access controls on the Baseboard Management Controller (BMC) to limit administrative access only to trusted personnel and systems. Network segmentation should be employed to isolate management interfaces from general network access, reducing the attack surface. Monitoring and logging of BMC and HMC access should be enhanced to detect unauthorized or suspicious activities promptly. Organizations should apply security best practices such as multi-factor authentication for management interfaces where supported. Since no patches are currently available, vendors and users should maintain close communication with NVIDIA for updates and apply patches immediately upon release. Additionally, conducting regular security audits and vulnerability assessments on management controllers can help identify and remediate potential weaknesses before exploitation. Implementing hardware-level security features and firmware integrity checks can further reduce risk.
Affected Countries
United States, China, Germany, Japan, South Korea, United Kingdom, France, Canada, India, Australia
CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300
Description
NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-23337 is a vulnerability identified in the HGX Management Controller (HMC) component of NVIDIA's HGX and DGX server platforms, specifically models GB200, GB300, and B300. The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues. The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access to the HMC, effectively gaining administrative control over this critical management component. The HMC is responsible for managing hardware resources and system operations in these high-performance computing platforms. Exploiting this vulnerability can enable the attacker to execute arbitrary code, cause denial of service conditions, escalate privileges further, disclose sensitive information, and tamper with data. The CVSS v3.1 score is 6.7, indicating a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects specific versions: GB200 1.2, GB300 0.8 dev drop, and B300 0.6. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risk of lateral movement and privilege escalation within the management infrastructure of NVIDIA's high-performance computing systems.
Potential Impact
The impact of CVE-2025-23337 is significant for organizations deploying NVIDIA HGX and DGX platforms, especially in data centers, research institutions, and enterprises relying on these systems for AI, machine learning, and high-performance computing workloads. Successful exploitation can lead to full administrative control over the HMC, allowing attackers to manipulate hardware management functions, disrupt operations through denial of service, execute arbitrary code potentially leading to persistent compromise, and access or alter sensitive data. This can undermine system integrity, availability, and confidentiality, potentially causing operational downtime, data breaches, and loss of trust. Since the vulnerability requires administrative access to the BMC, the risk is heightened in environments where BMC access controls are weak or compromised. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2025-23337, organizations should implement strict access controls on the Baseboard Management Controller (BMC) to limit administrative access only to trusted personnel and systems. Network segmentation should be employed to isolate management interfaces from general network access, reducing the attack surface. Monitoring and logging of BMC and HMC access should be enhanced to detect unauthorized or suspicious activities promptly. Organizations should apply security best practices such as multi-factor authentication for management interfaces where supported. Since no patches are currently available, vendors and users should maintain close communication with NVIDIA for updates and apply patches immediately upon release. Additionally, conducting regular security audits and vulnerability assessments on management controllers can help identify and remediate potential weaknesses before exploitation. Implementing hardware-level security features and firmware integrity checks can further reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- nvidia
- Date Reserved
- 2025-01-14T01:07:19.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cb4e05e5fa2c8b1490b359
Added to database: 9/18/2025, 12:10:45 AM
Last enriched: 2/27/2026, 1:04:18 AM
Last updated: 3/22/2026, 5:49:42 PM
Views: 205
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.