Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33179: CWE-266 Incorrect Privilege Assignment in NVIDIA Cumulus Linux GA

0
High
VulnerabilityCVE-2025-33179cvecve-2025-33179cwe-266
Published: Tue Feb 24 2026 (02/24/2026, 18:41:32 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Cumulus Linux GA

Description

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 19:08:53 UTC

Technical Analysis

CVE-2025-33179 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) found in NVIDIA's Cumulus Linux GA and NVOS products, specifically within the NVUE interface. This interface improperly assigns privileges, enabling a low-privileged user to execute commands that should be restricted. The vulnerability affects all versions prior to 5.14, including 5.13.x, 5.12.x, and older GA releases. The flaw allows privilege escalation without requiring user interaction, increasing the risk of unauthorized administrative access to network devices running these operating systems. The CVSS 3.1 base score of 8.0 reflects a high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability poses a significant risk to network security, especially in environments where multiple users have low-level access. The NVUE interface is critical for network management, so exploitation could lead to full system compromise, data breaches, or disruption of network services. The vulnerability was reserved in April 2025 and published in February 2026, indicating a recent discovery and disclosure. No patches or updates are linked yet, so users must monitor NVIDIA advisories closely. This vulnerability underscores the importance of secure privilege management in network operating systems.

Potential Impact

The impact of CVE-2025-33179 is substantial for organizations relying on NVIDIA Cumulus Linux GA and NVOS for their network infrastructure. Successful exploitation allows low-privileged users to escalate their privileges and execute unauthorized commands, potentially gaining full administrative control over network devices. This can lead to unauthorized data access, modification, or deletion, disruption of network services, and compromise of network integrity. Given the high confidentiality, integrity, and availability impacts, attackers could manipulate routing, intercept sensitive communications, or cause denial of service. The vulnerability's ease of exploitation (low complexity, no user interaction) increases the likelihood of attacks, especially in multi-tenant or shared environments. Organizations in sectors such as telecommunications, cloud service providers, data centers, and enterprises with large-scale network deployments face elevated risks. The absence of known exploits currently provides a window for proactive mitigation, but the threat of future exploitation remains significant.

Mitigation Recommendations

To mitigate CVE-2025-33179, organizations should prioritize upgrading NVIDIA Cumulus Linux GA and NVOS to version 5.14 or later once official patches are released. Until then, restrict access to the NVUE interface to trusted administrators only, employing network segmentation and strict access control lists (ACLs) to limit exposure. Implement role-based access control (RBAC) to minimize the number of users with low privileges who can access the vulnerable interface. Monitor logs and network activity for unusual command executions or privilege escalations. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior related to NVUE commands. Regularly audit user permissions and remove unnecessary accounts. Coordinate with NVIDIA support for timely updates and advisories. Additionally, consider deploying compensating controls such as multi-factor authentication (MFA) for administrative access and isolating management interfaces from general user networks to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e77

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 3/4/2026, 7:08:53 PM

Last updated: 4/9/2026, 5:28:19 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses