Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23339: CWE-121 Stack-based Buffer Overflow in NVIDIA NVIDIA CUDA Toolkit

0
Low
VulnerabilityCVE-2025-23339cvecve-2025-23339cwe-121
Published: Wed Sep 24 2025 (09/24/2025, 13:13:04 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA CUDA Toolkit

Description

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in cuobjdump where an attacker may cause a stack-based buffer overflow by getting the user to run cuobjdump on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running cuobjdump.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:04:33 UTC

Technical Analysis

CVE-2025-23339 is a stack-based buffer overflow vulnerability identified in the cuobjdump utility of the NVIDIA CUDA Toolkit, affecting all versions prior to 13.0. The vulnerability arises when cuobjdump processes a maliciously crafted ELF (Executable and Linkable Format) file, leading to a buffer overflow on the stack. This overflow can corrupt the execution stack, potentially allowing an attacker to execute arbitrary code with the privileges of the user running cuobjdump. The vulnerability is classified under CWE-121, which pertains to improper handling of buffer boundaries leading to stack-based buffer overflows. Exploitation requires the attacker to convince a user to run cuobjdump on a malicious ELF file, implying local access and user interaction are necessary. The CVSS v3.1 base score is 3.3, reflecting low severity due to the attack vector being local (AV:L), low privileges required (PR:N), and user interaction needed (UI:R). The impact on confidentiality is limited, with no impact on integrity or availability. No public exploits have been reported, and no patches were linked at the time of publication, though upgrading to CUDA Toolkit 13.0 or later is recommended.

Potential Impact

The primary impact of this vulnerability is the potential for arbitrary code execution at the user privilege level, which could allow an attacker to execute malicious code within the context of the compromised user account. While this does not directly affect system-wide integrity or availability, it can lead to unauthorized actions such as data theft or local privilege escalation if combined with other vulnerabilities. Since exploitation requires local access and user interaction, the threat is limited to environments where users run cuobjdump on untrusted ELF files. Organizations relying on NVIDIA CUDA Toolkit for GPU-accelerated computing, AI research, or development may face risks if attackers can trick users into processing malicious files. The low CVSS score and absence of known exploits reduce the immediate risk, but the vulnerability still poses a security concern in sensitive or high-security environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade to NVIDIA CUDA Toolkit version 13.0 or later, where the issue is resolved. Until an upgrade is possible, restrict access to the cuobjdump utility to trusted users only and implement strict file validation policies to prevent running cuobjdump on untrusted or unknown ELF files. Employ endpoint security solutions that monitor and block suspicious file executions and consider sandboxing or isolating environments where cuobjdump is used to limit potential damage. Educate users about the risks of processing untrusted files and enforce the principle of least privilege to minimize the impact of any successful exploit. Regularly review and audit usage of CUDA Toolkit tools to detect anomalous behavior related to ELF file processing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d3f06c37fc381b138d531d

Added to database: 9/24/2025, 1:21:48 PM

Last enriched: 2/27/2026, 1:04:33 AM

Last updated: 3/23/2026, 12:57:46 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses