Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23358: CWE-427 Uncontrolled Search Path Element in NVIDIA NVApp

0
High
VulnerabilityCVE-2025-23358cvecve-2025-23358cwe-427
Published: Tue Nov 04 2025 (11/04/2025, 19:47:35 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVApp

Description

NVIDIA NVApp for Windows contains a vulnerability in the installer, where a local attacker can cause a search path element issue. A successful exploit of this vulnerability might lead to code execution and escalation of privileges.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:18:59 UTC

Technical Analysis

CVE-2025-23358 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in the NVIDIA NVApp installer for Windows. The issue arises because the installer improperly manages the search path elements, allowing a local attacker to influence the loading of executable files or DLLs by placing malicious files in directories that are searched before legitimate ones. This can lead to arbitrary code execution within the context of the installer, which typically runs with elevated privileges. The attacker requires local access with limited privileges and some user interaction to trigger the exploit. Successful exploitation results in escalation of privileges, enabling the attacker to gain higher system rights, potentially leading to full system compromise. The vulnerability affects all NVApp versions prior to 11.0.5.260. The CVSS 3.1 base score is 8.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring local access and user interaction. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially in environments where NVIDIA NVApp is installed, such as workstations used for gaming, graphic design, AI development, or scientific computing. Exploitation can lead to unauthorized code execution and privilege escalation, potentially allowing attackers to install persistent malware, steal sensitive data, or disrupt operations. The risk is heightened in organizations with many local users or shared workstations, as local attackers or malicious insiders could exploit this flaw. Additionally, the compromise of privileged accounts could facilitate lateral movement and further attacks within corporate networks. The impact extends to confidentiality, integrity, and availability of affected systems, making it critical for organizations to address the vulnerability promptly to avoid potential data breaches or operational disruptions.

Mitigation Recommendations

Organizations should immediately inventory their systems to identify installations of NVIDIA NVApp and verify the version in use. Since no patch is currently available, interim mitigations include restricting local user permissions to prevent unauthorized file placement in directories searched by the installer. Implement application whitelisting to block execution of unauthorized binaries and monitor for suspicious file creation or modification in relevant directories. Educate users to avoid running untrusted installers or applications and limit local administrative privileges. Once NVIDIA releases a patch or update beyond version 11.0.5.260, prioritize deployment across all affected systems. Additionally, employ endpoint detection and response (EDR) tools to detect anomalous behaviors indicative of exploitation attempts. Regularly review and harden system configurations to minimize the attack surface related to local privilege escalation vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:26.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a5c46a730e5a3d9e13c8c

Added to database: 11/4/2025, 8:04:22 PM

Last enriched: 11/4/2025, 8:18:59 PM

Last updated: 11/5/2025, 1:44:13 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats