Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33184: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Isaac-GR00T N1.5

0
High
VulnerabilityCVE-2025-33184cvecve-2025-33184cwe-94
Published: Tue Nov 18 2025 (11/18/2025, 16:57:43 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA Isaac-GR00T N1.5

Description

NVIDIA Isaac-GR00T for all platforms contains a vulnerability in a Python component, where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 11/25/2025, 18:11:58 UTC

Technical Analysis

CVE-2025-33184 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting NVIDIA Isaac-GR00T N1.5, a robotics and AI software platform. The vulnerability is located in a Python component where insufficient validation or sanitization of input leads to code injection. This allows an attacker with local access and low privileges to execute arbitrary code within the context of the application, potentially escalating privileges further. The vulnerability does not require user interaction, increasing its risk profile. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector limited to local access but low attack complexity and privileges required. Exploitation could result in unauthorized code execution, data manipulation, and leakage of sensitive information. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a critical concern for environments running affected versions. The fix involves updating to versions including the code commit 7f53666, which addresses the improper code generation control. Due to the use of Python, the vulnerability likely arises from unsafe dynamic code evaluation or execution functions. This vulnerability underscores the importance of secure coding practices in AI and robotics software stacks.

Potential Impact

For European organizations, the impact of CVE-2025-33184 is significant, especially those involved in robotics, AI development, and automation relying on NVIDIA Isaac-GR00T. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, escalate privileges, and manipulate or exfiltrate sensitive data. This threatens operational continuity, intellectual property, and data privacy compliance under regulations such as GDPR. Industrial automation and research institutions could face disruption or espionage risks. The requirement for local access limits remote exploitation but insider threats or compromised endpoints could serve as attack vectors. The high integrity and availability impact could disrupt critical robotic functions, affecting manufacturing, logistics, or research activities. The lack of known exploits currently provides a window for proactive defense, but the vulnerability’s severity demands urgent attention to prevent potential targeted attacks.

Mitigation Recommendations

1. Immediately update NVIDIA Isaac-GR00T N1.5 to versions including code commit 7f53666 or later once available from NVIDIA. 2. Restrict local access to systems running Isaac-GR00T to trusted personnel only, employing strict access controls and monitoring. 3. Implement application whitelisting and sandboxing to limit the execution of unauthorized code within the environment. 4. Conduct thorough code audits and static analysis on custom scripts or integrations with Isaac-GR00T to detect unsafe dynamic code execution patterns. 5. Monitor system logs and behavior for signs of code injection attempts or privilege escalation activities. 6. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous process behavior related to code injection. 7. Educate staff on the risks of local exploitation and enforce strong endpoint security hygiene to reduce insider threat risks. 8. If patching is delayed, consider isolating affected systems from sensitive networks to limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168e7

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 11/25/2025, 6:11:58 PM

Last updated: 1/7/2026, 8:55:11 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats