CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300
NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI Analysis
Technical Summary
CVE-2025-23337 is a medium severity vulnerability affecting NVIDIA's HGX and DGX series products, specifically the HGX GB200 (version 1.2), HGX GB300 (0.8 dev drop), and HGC B300 (0.6). The vulnerability resides in the HGX Management Controller (HMC), a critical component responsible for managing and monitoring the hardware platform. The flaw allows a malicious actor who already has administrative access to the Baseboard Management Controller (BMC) to escalate privileges and gain administrative access to the HMC. This access can lead to multiple severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation, information disclosure, and data tampering. The CVSS v3.1 score of 6.7 reflects a medium severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues within management controllers. Although no known exploits are currently in the wild and no patches have been released yet, the vulnerability poses a significant risk in environments where administrative access to the BMC is possible, potentially allowing attackers to compromise the management infrastructure of high-performance computing platforms. These platforms are often used in data centers, research institutions, and enterprises requiring advanced GPU computing capabilities.
Potential Impact
For European organizations, especially those operating data centers, research facilities, or enterprises leveraging NVIDIA HGX and DGX platforms for AI, machine learning, or high-performance computing workloads, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized control over critical management components, enabling attackers to disrupt operations via denial of service, manipulate sensitive data, or execute arbitrary code that could compromise the confidentiality and integrity of intellectual property or sensitive computations. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and loss of trust. The requirement for administrative BMC access limits the attack surface but does not eliminate risk, as insider threats or lateral movement within compromised networks could enable exploitation. The absence of patches means organizations must rely on compensating controls until updates are available. The vulnerability could also affect supply chain security if compromised management controllers are used in multi-tenant or cloud environments, potentially impacting multiple customers.
Mitigation Recommendations
1. Restrict and tightly control administrative access to the Baseboard Management Controller (BMC) interfaces, ensuring only trusted personnel have such privileges. 2. Implement network segmentation and access controls to isolate management interfaces from general network traffic, reducing the risk of unauthorized access. 3. Monitor and audit all administrative access to BMC and HMC components for unusual or unauthorized activities, employing anomaly detection where possible. 4. Employ strong authentication mechanisms (e.g., multi-factor authentication) for accessing management controllers to reduce risk of credential compromise. 5. Until official patches are released, consider disabling or limiting remote management features if feasible, or use VPNs and encrypted channels to secure management traffic. 6. Maintain up-to-date inventory of affected NVIDIA hardware and firmware versions to prioritize risk assessment and remediation planning. 7. Engage with NVIDIA support channels for early notification of patches or workarounds and apply updates promptly once available. 8. Conduct penetration testing and vulnerability assessments focused on management controllers to identify potential exploitation paths within the environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy
CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300
Description
NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
AI-Powered Analysis
Technical Analysis
CVE-2025-23337 is a medium severity vulnerability affecting NVIDIA's HGX and DGX series products, specifically the HGX GB200 (version 1.2), HGX GB300 (0.8 dev drop), and HGC B300 (0.6). The vulnerability resides in the HGX Management Controller (HMC), a critical component responsible for managing and monitoring the hardware platform. The flaw allows a malicious actor who already has administrative access to the Baseboard Management Controller (BMC) to escalate privileges and gain administrative access to the HMC. This access can lead to multiple severe consequences including arbitrary code execution, denial of service (DoS), privilege escalation, information disclosure, and data tampering. The CVSS v3.1 score of 6.7 reflects a medium severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues within management controllers. Although no known exploits are currently in the wild and no patches have been released yet, the vulnerability poses a significant risk in environments where administrative access to the BMC is possible, potentially allowing attackers to compromise the management infrastructure of high-performance computing platforms. These platforms are often used in data centers, research institutions, and enterprises requiring advanced GPU computing capabilities.
Potential Impact
For European organizations, especially those operating data centers, research facilities, or enterprises leveraging NVIDIA HGX and DGX platforms for AI, machine learning, or high-performance computing workloads, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized control over critical management components, enabling attackers to disrupt operations via denial of service, manipulate sensitive data, or execute arbitrary code that could compromise the confidentiality and integrity of intellectual property or sensitive computations. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and loss of trust. The requirement for administrative BMC access limits the attack surface but does not eliminate risk, as insider threats or lateral movement within compromised networks could enable exploitation. The absence of patches means organizations must rely on compensating controls until updates are available. The vulnerability could also affect supply chain security if compromised management controllers are used in multi-tenant or cloud environments, potentially impacting multiple customers.
Mitigation Recommendations
1. Restrict and tightly control administrative access to the Baseboard Management Controller (BMC) interfaces, ensuring only trusted personnel have such privileges. 2. Implement network segmentation and access controls to isolate management interfaces from general network traffic, reducing the risk of unauthorized access. 3. Monitor and audit all administrative access to BMC and HMC components for unusual or unauthorized activities, employing anomaly detection where possible. 4. Employ strong authentication mechanisms (e.g., multi-factor authentication) for accessing management controllers to reduce risk of credential compromise. 5. Until official patches are released, consider disabling or limiting remote management features if feasible, or use VPNs and encrypted channels to secure management traffic. 6. Maintain up-to-date inventory of affected NVIDIA hardware and firmware versions to prioritize risk assessment and remediation planning. 7. Engage with NVIDIA support channels for early notification of patches or workarounds and apply updates promptly once available. 8. Conduct penetration testing and vulnerability assessments focused on management controllers to identify potential exploitation paths within the environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- nvidia
- Date Reserved
- 2025-01-14T01:07:19.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cb4e05e5fa2c8b1490b359
Added to database: 9/18/2025, 12:10:45 AM
Last enriched: 9/18/2025, 12:11:34 AM
Last updated: 9/18/2025, 12:11:34 AM
Views: 2
Related Threats
CVE-2025-10631: Cross Site Scripting in itsourcecode Online Petshop Management System
MediumCVE-2025-10629: Command Injection in D-Link DIR-852
MediumCVE-2025-10628: Command Injection in D-Link DIR-852
MediumCVE-2025-38380
LowCVE-2025-35430: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CISA Thorium
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.