Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23337: CWE-1244 in NVIDIA HGX GB200, HGX GB300, HGC B300

0
Medium
VulnerabilityCVE-2025-23337cvecve-2025-23337cwe-1244
Published: Wed Sep 17 2025 (09/17/2025, 22:27:15 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: HGX GB200, HGX GB300, HGC B300

Description

NVIDIA HGX & DGX GB200, GB300, B300 contain a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:04:18 UTC

Technical Analysis

CVE-2025-23337 is a vulnerability identified in the HGX Management Controller (HMC) component of NVIDIA's HGX and DGX server platforms, specifically models GB200, GB300, and B300. The vulnerability is classified under CWE-1244, which relates to improper access control or authorization issues. The flaw allows an attacker who already has administrative privileges on the Baseboard Management Controller (BMC) to escalate their access to the HMC, effectively gaining administrative control over this critical management component. The HMC is responsible for managing hardware resources and system operations in these high-performance computing platforms. Exploiting this vulnerability can enable the attacker to execute arbitrary code, cause denial of service conditions, escalate privileges further, disclose sensitive information, and tamper with data. The CVSS v3.1 score is 6.7, indicating a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects specific versions: GB200 1.2, GB300 0.8 dev drop, and B300 0.6. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risk of lateral movement and privilege escalation within the management infrastructure of NVIDIA's high-performance computing systems.

Potential Impact

The impact of CVE-2025-23337 is significant for organizations deploying NVIDIA HGX and DGX platforms, especially in data centers, research institutions, and enterprises relying on these systems for AI, machine learning, and high-performance computing workloads. Successful exploitation can lead to full administrative control over the HMC, allowing attackers to manipulate hardware management functions, disrupt operations through denial of service, execute arbitrary code potentially leading to persistent compromise, and access or alter sensitive data. This can undermine system integrity, availability, and confidentiality, potentially causing operational downtime, data breaches, and loss of trust. Since the vulnerability requires administrative access to the BMC, the risk is heightened in environments where BMC access controls are weak or compromised. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate CVE-2025-23337, organizations should implement strict access controls on the Baseboard Management Controller (BMC) to limit administrative access only to trusted personnel and systems. Network segmentation should be employed to isolate management interfaces from general network access, reducing the attack surface. Monitoring and logging of BMC and HMC access should be enhanced to detect unauthorized or suspicious activities promptly. Organizations should apply security best practices such as multi-factor authentication for management interfaces where supported. Since no patches are currently available, vendors and users should maintain close communication with NVIDIA for updates and apply patches immediately upon release. Additionally, conducting regular security audits and vulnerability assessments on management controllers can help identify and remediate potential weaknesses before exploitation. Implementing hardware-level security features and firmware integrity checks can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cb4e05e5fa2c8b1490b359

Added to database: 9/18/2025, 12:10:45 AM

Last enriched: 2/27/2026, 1:04:18 AM

Last updated: 3/22/2026, 5:49:42 PM

Views: 205

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses