Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33184: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Isaac-GR00T N1.5

0
High
VulnerabilityCVE-2025-33184cvecve-2025-33184cwe-94
Published: Tue Nov 18 2025 (11/18/2025, 16:57:43 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA Isaac-GR00T N1.5

Description

NVIDIA Isaac-GR00T for all platforms contains a vulnerability in a Python component, where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:20:10 UTC

Technical Analysis

CVE-2025-33184 is a vulnerability classified under CWE-94, indicating improper control of code generation leading to code injection within the NVIDIA Isaac-GR00T N1.5 platform. The flaw exists in a Python component used across all platforms supported by Isaac-GR00T. An attacker with local access and low privileges can exploit this vulnerability to inject and execute arbitrary code without requiring user interaction. This can result in a range of severe consequences including execution of malicious code, escalation of privileges beyond the attacker’s initial access level, unauthorized disclosure of sensitive information, and tampering with data integrity. The vulnerability affects all versions of Isaac-GR00T N1.5 that do not include the code commit 7f53666, which presumably contains the fix. The CVSS v3.1 base score is 7.8, with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the nature of the vulnerability makes it a critical concern for environments relying on Isaac-GR00T, especially in robotics and AI where code execution integrity is paramount. The vulnerability was reserved in April 2025 and published in November 2025, suggesting a recent discovery and disclosure. Given the Python component’s role, the vulnerability likely stems from unsafe dynamic code generation or evaluation practices, such as unsanitized input being passed to eval or exec functions. This flaw could be leveraged by malicious insiders or attackers who gain limited local access to the system.

Potential Impact

For European organizations, the impact of CVE-2025-33184 is significant, particularly for those involved in robotics, AI development, and automation sectors where NVIDIA Isaac-GR00T is deployed. Successful exploitation could lead to complete system compromise, allowing attackers to execute arbitrary code, escalate privileges, and manipulate or exfiltrate sensitive data. This undermines the confidentiality, integrity, and availability of critical systems, potentially disrupting operations and causing financial and reputational damage. The vulnerability’s local attack vector means that insider threats or attackers who gain initial foothold via other means could leverage this flaw to deepen their access. Given the increasing adoption of robotics and AI in manufacturing, automotive, and research institutions across Europe, the risk extends to critical infrastructure and industrial control systems. Additionally, data tampering could affect the reliability of AI models and robotic operations, leading to safety risks and operational failures. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management.

Mitigation Recommendations

1. Apply the patch or update to NVIDIA Isaac-GR00T N1.5 that includes code commit 7f53666 as soon as it becomes available to remediate the vulnerability. 2. Restrict local access to systems running Isaac-GR00T to trusted personnel only, employing strong authentication and access control mechanisms to reduce the risk of exploitation. 3. Implement application whitelisting and runtime application self-protection (RASP) to detect and prevent unauthorized code execution within the environment. 4. Conduct thorough input validation and sanitization in any custom scripts or integrations interacting with Isaac-GR00T to avoid introducing similar code injection vectors. 5. Monitor system logs and behavior for unusual activities indicative of code injection attempts or privilege escalation, using endpoint detection and response (EDR) tools. 6. Employ network segmentation to isolate critical robotics and AI systems from general user networks, limiting lateral movement opportunities. 7. Educate staff about the risks of local privilege escalation and enforce policies to minimize the installation of unauthorized software or scripts. 8. Regularly audit and update security configurations and ensure that all dependencies and components related to Isaac-GR00T are kept up to date.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168e7

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 11/18/2025, 5:20:10 PM

Last updated: 11/21/2025, 10:52:07 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats