Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23361: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-23361cvecve-2025-23361cwe-94
Published: Tue Nov 11 2025 (11/11/2025, 16:18:05 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework for all platforms contains a vulnerability in a script, where malicious input created by an attacker may cause improper control of code generation. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 11/19/2025, 01:19:55 UTC

Technical Analysis

CVE-2025-23361 is a code injection vulnerability classified under CWE-94 found in the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI models and speech processing applications. The flaw exists in a script component that improperly controls code generation, allowing an attacker to inject and execute arbitrary code. This vulnerability affects all versions of NeMo prior to 2.5.0 across all platforms. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N), which means an attacker with limited access to the system can exploit it without needing to trick a user. The vulnerability can lead to severe consequences including remote code execution, escalation of privileges, unauthorized information disclosure, and data tampering, impacting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the high CVSS score (7.8) reflects the significant risk posed by this vulnerability. The improper control of code generation suggests that input validation or sanitization is insufficient, allowing malicious payloads to be executed within the context of the NeMo framework. This is particularly critical in environments where NeMo is integrated into AI pipelines or production systems, as attackers could leverage this flaw to compromise AI models or underlying infrastructure. NVIDIA has reserved and published this CVE in 2025, but no patch links are currently available, indicating that remediation may be pending or in progress.

Potential Impact

For European organizations, the impact of CVE-2025-23361 can be substantial, especially those involved in AI research, development, and deployment using the NVIDIA NeMo Framework. Successful exploitation could lead to unauthorized code execution within AI environments, potentially compromising sensitive data, intellectual property, and AI model integrity. This could disrupt AI-driven services, cause data breaches, and allow attackers to manipulate AI outputs or gain further access to corporate networks. Industries such as automotive, telecommunications, healthcare, and finance, which increasingly rely on AI and NVIDIA technologies, are particularly vulnerable. The vulnerability's requirement for local access means insider threats or attackers who have already gained limited footholds could escalate their privileges and cause significant damage. Additionally, the potential for data tampering and information disclosure raises compliance and regulatory concerns under GDPR and other European data protection laws. The lack of user interaction needed for exploitation increases the risk of automated or stealthy attacks within compromised environments.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, monitor NVIDIA’s official channels for the release of NeMo Framework version 2.5.0 or later, which will contain the patch, and plan for rapid deployment. Until patches are available, restrict local access to systems running NeMo, employing strict access controls and network segmentation to limit exposure. Implement application whitelisting and monitor script execution within AI environments to detect anomalous behavior indicative of code injection attempts. Conduct thorough input validation and sanitization on any user or external inputs interfacing with NeMo scripts. Employ endpoint detection and response (EDR) solutions to identify suspicious activities related to privilege escalation or code execution. Additionally, review and harden privilege assignments to minimize the number of users with local access rights. Regularly audit AI infrastructure and maintain up-to-date backups to enable recovery in case of compromise. Finally, raise awareness among developers and system administrators about this vulnerability to ensure proactive defense measures are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:26.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69136629f922b639ab60126b

Added to database: 11/11/2025, 4:36:57 PM

Last enriched: 11/19/2025, 1:19:55 AM

Last updated: 11/21/2025, 1:24:05 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats