Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300

0
Medium
VulnerabilityCVE-2025-23337cvecve-2025-23337cwe-1244
Published: Wed Sep 17 2025 (09/17/2025, 22:27:15 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: HGX GB200, HGX GB300, HGC B300

Description

NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:36:25 UTC

Technical Analysis

CVE-2025-23337 is a vulnerability identified in NVIDIA's HGX and DGX server platforms, specifically affecting the HGX GB200, HGX GB300, and HGC B300 models. The flaw resides within the HGX Management Controller (HMC), a critical component responsible for managing hardware resources and system operations. The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues. In this case, a malicious actor who already has administrative access to the Baseboard Management Controller (BMC) can leverage this vulnerability to gain administrative access to the HMC. This escalation of privileges can lead to several severe consequences, including arbitrary code execution on the management controller, denial of service conditions that could disrupt system availability, unauthorized disclosure of sensitive information, and tampering with data or system configurations. The vulnerability has a CVSS v3.1 base score of 6.7, indicating a medium severity level. The vector details specify that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions include GB200 1.2, GB300 0.8 dev drop, and B300 0.6. Given the nature of the vulnerability, it primarily threatens environments where attackers can gain administrative access to the BMC, which is typically restricted but possible in compromised or insider threat scenarios. The HMC's role in managing critical hardware functions means exploitation could severely impact system reliability and security.

Potential Impact

For European organizations utilizing NVIDIA HGX and DGX platforms, particularly in data centers, AI research, and high-performance computing environments, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control over hardware management functions, potentially allowing attackers to disrupt critical operations, manipulate sensitive data, or compromise system integrity. Given the high confidentiality, integrity, and availability impacts, organizations could face operational downtime, data breaches, and loss of trust. The requirement for administrative BMC access limits the attack surface but does not eliminate risk, especially in large organizations with complex infrastructure where insider threats or lateral movement by attackers are concerns. The absence of known exploits reduces immediate risk but necessitates proactive measures. The vulnerability could also affect supply chain security if these platforms are used in managed services or cloud environments serving European customers. Compliance with EU data protection regulations (e.g., GDPR) may be impacted if data confidentiality is compromised.

Mitigation Recommendations

1. Restrict and monitor administrative access to the BMC rigorously, employing strong authentication mechanisms such as multi-factor authentication and role-based access controls. 2. Implement network segmentation and firewall rules to isolate management interfaces (BMC and HMC) from general network access, limiting exposure to trusted personnel and systems only. 3. Continuously monitor logs and alerts related to BMC and HMC access for unusual or unauthorized activities to detect potential exploitation attempts early. 4. Engage with NVIDIA for official patches or firmware updates addressing CVE-2025-23337 and apply them promptly once available. 5. Conduct regular security audits and penetration testing focusing on management controllers to identify and remediate potential access control weaknesses. 6. Educate system administrators and relevant staff about the risks associated with management controller access and enforce strict operational procedures. 7. Consider deploying hardware-based security features or trusted platform modules (TPMs) to enhance the integrity of management controllers. 8. Maintain an incident response plan that includes scenarios involving management controller compromise to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cb4e05e5fa2c8b1490b359

Added to database: 9/18/2025, 12:10:45 AM

Last enriched: 9/25/2025, 12:36:25 AM

Last updated: 11/2/2025, 7:22:32 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats