Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33182: CWE-862 Missing Authorization in NVIDIA Jetson Orin Series

0
High
VulnerabilityCVE-2025-33182cvecve-2025-33182cwe-862
Published: Tue Oct 14 2025 (10/14/2025, 19:09:39 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Jetson Orin Series

Description

NVIDIA Jetson Linux contains a vulnerability in UEFI, where improper authentication may allow a privileged user to cause corruption of the Linux Device Tree. A successful exploitation of this vulnerability might lead to data tampering, denial of service.

AI-Powered Analysis

AILast updated: 10/14/2025, 19:19:36 UTC

Technical Analysis

CVE-2025-33182 identifies a missing authorization vulnerability (CWE-862) in the UEFI firmware component of NVIDIA Jetson Orin Series devices running Linux, specifically in versions 35.6.2 and earlier. The flaw arises because the UEFI implementation does not properly authenticate privileged users attempting to modify the Linux Device Tree, a critical data structure that describes hardware components to the operating system. This lack of proper authorization checks enables a privileged user to corrupt the Device Tree, which can lead to data tampering or denial of service conditions. The vulnerability has a CVSS 3.1 base score of 7.6, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope change (S:C). The impact affects integrity (I:H) and availability (A:L) but not confidentiality. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk in environments where attackers can gain privileged access, such as compromised containers or local admin accounts. The Jetson Orin Series is widely used in embedded AI, robotics, and edge computing, making this vulnerability relevant for critical infrastructure and industrial applications. The absence of patches at the time of disclosure necessitates immediate risk mitigation through access controls and monitoring.

Potential Impact

For European organizations, the vulnerability presents a risk primarily to systems deploying NVIDIA Jetson Orin devices in industrial automation, automotive, robotics, and AI edge computing. Successful exploitation could allow an attacker with privileged access to corrupt the Linux Device Tree, potentially causing system instability, denial of service, or manipulation of hardware configurations. This could disrupt manufacturing processes, autonomous vehicle operations, or critical research activities relying on these platforms. The integrity compromise could also facilitate further attacks or data tampering within embedded systems. Given the increasing adoption of NVIDIA Jetson platforms in European technology sectors, the impact could extend to supply chain disruptions and operational downtime. Organizations with stringent uptime and safety requirements may face significant operational and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

1. Restrict privileged access strictly to trusted administrators and processes to reduce the risk of exploitation. 2. Implement robust monitoring of the Linux Device Tree and system firmware integrity to detect unauthorized changes promptly. 3. Employ hardware security features such as secure boot and measured boot to prevent unauthorized firmware modifications. 4. Isolate Jetson Orin devices in network segments with limited exposure to reduce attack surface. 5. Prepare for patch deployment by tracking NVIDIA advisories and testing updates in controlled environments once patches become available. 6. Conduct regular audits of user privileges and system configurations to ensure no unauthorized escalation paths exist. 7. Utilize endpoint detection and response (EDR) tools capable of identifying anomalous firmware or device tree modifications. 8. Develop incident response plans specific to embedded device compromise scenarios to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eea212ae73b78941ef5551

Added to database: 10/14/2025, 7:18:42 PM

Last enriched: 10/14/2025, 7:19:36 PM

Last updated: 10/14/2025, 7:36:26 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats