Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23358: CWE-427 Uncontrolled Search Path Element in NVIDIA NVApp

0
High
VulnerabilityCVE-2025-23358cvecve-2025-23358cwe-427
Published: Tue Nov 04 2025 (11/04/2025, 19:47:35 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVApp

Description

NVIDIA NVApp for Windows contains a vulnerability in the installer, where a local attacker can cause a search path element issue. A successful exploit of this vulnerability might lead to code execution and escalation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:05:47 UTC

Technical Analysis

CVE-2025-23358 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting NVIDIA NVApp on Windows platforms. The issue resides in the installer component of NVApp versions prior to 11.0.5.260, where the search path for loading executable components or libraries is not properly controlled. This flaw enables a local attacker with limited privileges to manipulate the search path, causing the system to load malicious code instead of legitimate components. Successful exploitation can lead to arbitrary code execution with escalated privileges, thereby compromising system integrity and confidentiality. The vulnerability requires local access and some user interaction, such as running the installer or triggering the vulnerable component. The CVSS v3.1 score is 8.2, reflecting high severity due to the potential for complete system compromise and the complexity of exploitation being relatively low (low attack complexity and privileges required). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to environments where NVIDIA NVApp is deployed, especially in enterprise or high-security contexts. The uncontrolled search path element is a common vector for DLL hijacking or similar attacks, emphasizing the need for secure path handling in software installers.

Potential Impact

The impact of CVE-2025-23358 is substantial for organizations globally that deploy NVIDIA NVApp on Windows systems. Exploitation can result in unauthorized code execution and privilege escalation, potentially allowing attackers to gain administrative control over affected machines. This can lead to data breaches, installation of persistent malware, disruption of services, and compromise of sensitive information. Given NVIDIA's widespread use in gaming, professional visualization, AI research, and data centers, the vulnerability could affect a broad range of sectors including technology, finance, healthcare, and government. The ability to escalate privileges locally also raises concerns for multi-user environments and shared workstations. Although exploitation requires local access, insider threats or malware with limited privileges could leverage this vulnerability to deepen system compromise. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this issue.

Mitigation Recommendations

To mitigate CVE-2025-23358, organizations should: 1) Monitor NVIDIA's official channels for the release of NVApp version 11.0.5.260 or later and apply the update promptly once available. 2) Until patches are released, restrict local user privileges to the minimum necessary, preventing untrusted users from executing or modifying installer components. 3) Employ application whitelisting and code integrity policies to detect and block unauthorized DLLs or executables loaded via manipulated search paths. 4) Use endpoint detection and response (EDR) tools to monitor for suspicious activity related to NVApp or installer execution. 5) Educate users about the risks of running untrusted installers or software and enforce strict controls on software installation rights. 6) Conduct regular audits of installed software and system configurations to identify and remediate insecure search path settings. 7) Consider isolating critical systems or using virtualization/containerization to limit the impact of potential exploits. These measures, combined with timely patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:26.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a5c46a730e5a3d9e13c8c

Added to database: 11/4/2025, 8:04:22 PM

Last enriched: 2/27/2026, 1:05:47 AM

Last updated: 3/24/2026, 4:05:22 AM

Views: 242

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses