Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33179: CWE-266 Incorrect Privilege Assignment in NVIDIA Cumulus Linux GA

0
High
VulnerabilityCVE-2025-33179cvecve-2025-33179cwe-266
Published: Tue Feb 24 2026 (02/24/2026, 18:41:32 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Cumulus Linux GA

Description

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

AI-Powered Analysis

AILast updated: 02/24/2026, 19:32:49 UTC

Technical Analysis

CVE-2025-33179 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) found in NVIDIA Cumulus Linux GA and NVOS products, specifically in the NVUE interface. The vulnerability allows a low-privileged user to execute unauthorized commands, effectively enabling privilege escalation. This occurs because the NVUE interface improperly restricts command execution permissions, allowing users with limited rights to perform actions reserved for higher privilege levels. The affected versions include all releases prior to 5.14, encompassing 5.13.x, 5.12.x, and older GA versions. The CVSS 3.1 base score is 8.0, indicating high severity, with an attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the potential for unauthorized command execution and full system compromise. The NVUE interface is critical for network management and operations in Cumulus Linux environments, making this vulnerability particularly dangerous in enterprise and data center contexts where NVIDIA networking products are deployed. The flaw underscores the importance of proper privilege assignment and access control in network operating systems. NVIDIA has not yet published patches at the time of this report, so mitigation relies on limiting local user access and monitoring until updates are available.

Potential Impact

The impact of CVE-2025-33179 is substantial for organizations using NVIDIA Cumulus Linux GA versions prior to 5.14. Successful exploitation allows an attacker with low-level privileges to escalate their access, potentially gaining full administrative control over the system. This can lead to unauthorized disclosure of sensitive data, modification or destruction of critical system files, and disruption of network services. Given that Cumulus Linux is often deployed in data centers and cloud environments to manage network infrastructure, this vulnerability could facilitate lateral movement within networks, compromise of virtualized environments, and disruption of critical business operations. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate data, implant persistent backdoors, or cause denial of service. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with many users or where attackers have gained initial footholds. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score demands urgent attention to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2025-33179 effectively, organizations should take the following specific actions: 1) Upgrade NVIDIA Cumulus Linux GA installations to version 5.14 or later as soon as the patch becomes available from NVIDIA. 2) Until patches are released, restrict local user access to systems running affected versions by enforcing strict access control policies and limiting the number of users with shell or NVUE interface access. 3) Implement robust monitoring and logging of NVUE interface commands and user activities to detect any unauthorized or suspicious command executions promptly. 4) Employ network segmentation to isolate critical network infrastructure devices running Cumulus Linux from less trusted network zones to reduce the risk of lateral movement. 5) Conduct regular audits of user privileges and remove unnecessary accounts or permissions that could be leveraged for exploitation. 6) Use multi-factor authentication and strong credential management for all administrative and user accounts to reduce the risk of credential compromise. 7) Educate system administrators and security teams about the vulnerability and signs of exploitation to improve incident response readiness. 8) Consider deploying host-based intrusion detection systems (HIDS) or endpoint detection and response (EDR) solutions on affected devices to identify anomalous behavior related to privilege escalation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e77

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 2/24/2026, 7:32:49 PM

Last updated: 2/25/2026, 12:13:14 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats