Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23361: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-23361cvecve-2025-23361cwe-94
Published: Tue Nov 11 2025 (11/11/2025, 16:18:05 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework for all platforms contains a vulnerability in a script, where malicious input created by an attacker may cause improper control of code generation. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:12:08 UTC

Technical Analysis

CVE-2025-23361 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI models. The flaw exists in a script component of the framework where input validation is insufficient, allowing maliciously crafted input to influence code generation improperly. This improper control can enable an attacker with local access and limited privileges to inject and execute arbitrary code within the context of the NeMo framework process. The vulnerability does not require user interaction, increasing its risk profile. Successful exploitation can lead to critical impacts including arbitrary code execution, escalation of privileges beyond the initial attacker level, unauthorized disclosure of sensitive information processed by the framework, and tampering with data integrity. The vulnerability affects all versions prior to 2.5.0, with no patches or mitigations available except upgrading to the fixed version. The CVSS 3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and high impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild as of the publication date, but the nature of the flaw makes it a significant risk for environments where NeMo is deployed, especially in AI research labs, automotive AI systems, and enterprise AI applications.

Potential Impact

For European organizations, the impact of CVE-2025-23361 is substantial, particularly for those leveraging NVIDIA NeMo in AI development, research, or production environments. The ability for an attacker with limited local privileges to execute arbitrary code can lead to full system compromise, exposing sensitive intellectual property, customer data, or proprietary AI models. Escalation of privileges may allow attackers to move laterally within networks, increasing the risk of broader breaches. Data tampering threatens the integrity of AI training datasets and inference results, potentially causing erroneous outputs or degraded AI performance. Information disclosure risks could expose confidential research or personal data, impacting compliance with GDPR and other data protection regulations. The vulnerability's local attack vector means insider threats or compromised endpoints pose significant risks. Disruption of AI services due to availability impacts could affect business continuity in sectors relying on AI-driven automation or decision-making. Overall, the vulnerability could undermine trust in AI systems and cause regulatory and reputational damage.

Mitigation Recommendations

European organizations should immediately upgrade all NVIDIA NeMo Framework deployments to version 2.5.0 or later, where this vulnerability is addressed. Until upgrades are applied, restrict local access to systems running NeMo to trusted personnel only, employing strict access controls and monitoring. Implement endpoint security solutions capable of detecting anomalous script execution or code injection attempts within AI development environments. Conduct regular audits of user privileges and remove unnecessary local accounts to minimize attack surface. Employ application whitelisting to prevent unauthorized scripts from running. Network segmentation should isolate AI development and production environments from general user networks to limit lateral movement. Additionally, organizations should monitor logs for unusual activity related to NeMo processes and prepare incident response plans specific to AI infrastructure compromise. Finally, coordinate with NVIDIA for any forthcoming patches or security advisories and maintain awareness of emerging exploit reports.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:07:26.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69136629f922b639ab60126b

Added to database: 11/11/2025, 4:36:57 PM

Last enriched: 12/11/2025, 9:12:08 PM

Last updated: 1/7/2026, 8:55:54 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats