Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23345: CWE-125 Out-of-bounds Read in NVIDIA GeForce

0
Medium
VulnerabilityCVE-2025-23345cvecve-2025-23345cwe-125
Published: Thu Oct 23 2025 (10/23/2025, 18:25:48 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GeForce

Description

NVIDIA Display Driver for Windows and Linux contains a vulnerability in a video decoder, where an attacker might cause an out-of-bounds read. A successful exploit of this vulnerability might lead to information disclosure or denial of service.

AI-Powered Analysis

AILast updated: 10/23/2025, 18:38:25 UTC

Technical Analysis

CVE-2025-23345 is a vulnerability classified under CWE-125 (Out-of-bounds Read) found in the NVIDIA GeForce display driver for Windows and Linux platforms. The flaw resides in the video decoder component of the driver, where improper bounds checking allows an attacker to read memory outside the intended buffer. This can be exploited by a local attacker with low privileges (PR:L) and requires no user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have access to the system but does not need elevated privileges beyond low-level access. The vulnerability can cause denial of service (driver or system crash) or limited information disclosure, potentially leaking sensitive data from memory. The CVSS v3.1 base score is 4.4, reflecting medium severity due to the limited scope of impact and the requirement for local access. No public exploits are known, and no patches are linked yet, but the vendor has reserved the CVE and published the advisory. The vulnerability affects all driver versions prior to 581.42, so updating to this or later versions is essential. The flaw could be leveraged in multi-user environments or by malicious insiders to disrupt services or glean information from memory, impacting system stability and confidentiality to a limited extent.

Potential Impact

For European organizations, the primary impact of CVE-2025-23345 lies in potential denial of service and limited information disclosure on systems running vulnerable NVIDIA GeForce drivers. Organizations relying on GPU-accelerated workloads, such as research institutions, media production companies, and financial services using graphical processing for computations, may experience service interruptions or data leakage risks. Although the confidentiality impact is limited, any information disclosure could aid attackers in further exploitation or reconnaissance. Denial of service could disrupt critical operations, especially in environments where GPUs are integral to processing pipelines. The requirement for local access reduces the risk from remote attackers but raises concerns in shared or multi-user systems, including virtualized environments. European entities with strict data protection regulations (e.g., GDPR) must consider the implications of any data leakage, even if limited. Overall, the threat could affect operational continuity and data privacy, necessitating timely mitigation.

Mitigation Recommendations

1. Immediately update NVIDIA GeForce drivers to version 581.42 or later once available to remediate the vulnerability. 2. Restrict local access to systems with vulnerable drivers to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict user privilege management to prevent unauthorized users from gaining low-level access required to exploit the flaw. 4. Monitor system stability and logs for signs of crashes or anomalous behavior that could indicate exploitation attempts. 5. In multi-user or virtualized environments, isolate GPU resources and enforce access controls to limit exposure. 6. Coordinate with IT asset management to identify all systems running affected drivers and prioritize patching based on criticality. 7. Educate users about the risks of local exploitation and enforce endpoint security policies to reduce insider threats. 8. Consider deploying host-based intrusion detection systems (HIDS) to detect unusual local activity related to GPU drivers. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:21.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa73f6bf11aeb6491dbf8d

Added to database: 10/23/2025, 6:29:10 PM

Last enriched: 10/23/2025, 6:38:25 PM

Last updated: 10/23/2025, 10:20:25 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats