Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33190: CWE-787 Out-of-bounds Write in NVIDIA DGX Spark

0
Medium
VulnerabilityCVE-2025-33190cvecve-2025-33190cwe-787
Published: Tue Nov 25 2025 (11/25/2025, 17:58:19 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DGX Spark

Description

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or escalation of privileges.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:46:30 UTC

Technical Analysis

CVE-2025-33190 identifies a critical out-of-bounds write vulnerability classified under CWE-787 in the SROOT firmware of NVIDIA DGX Spark GB10 systems. The flaw exists in all firmware versions prior to OTA0 and allows an attacker with high-level privileges and local access to write outside the allocated memory bounds. This memory corruption can lead to multiple severe consequences including arbitrary code execution, data tampering, denial of service (system crashes or instability), and escalation of privileges within the system. The vulnerability is local access only (AV:L), requires low attack complexity (AC:L), but demands that the attacker already has high privileges (PR:H) and does not require user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability resides in the firmware layer, which is critical for system initialization and hardware control, making exploitation particularly impactful. No public exploits or patches are currently available, but the vendor has reserved the CVE and published the advisory. Given the specialized nature of DGX Spark systems, typically used in AI and high-performance computing environments, the attack surface is limited to environments where such hardware is deployed. However, successful exploitation could severely disrupt operations or compromise sensitive data processed by these systems.

Potential Impact

For European organizations, the impact of CVE-2025-33190 could be significant, especially for those operating NVIDIA DGX Spark systems in AI research, data analytics, and high-performance computing data centers. Exploitation could lead to unauthorized code execution, allowing attackers to manipulate or steal sensitive data, disrupt critical AI workloads, or gain elevated privileges to move laterally within the network. This could compromise intellectual property, research data, and operational continuity. Denial of service conditions could cause downtime in critical infrastructure, affecting service availability and business operations. Given the high confidentiality, integrity, and availability impacts, organizations relying on these systems must consider the risk to their data and operational resilience. The requirement for local high-privilege access limits remote exploitation but insider threats or compromised administrative accounts could be leveraged. The lack of current exploits provides a window for proactive mitigation, but the medium CVSS score suggests a non-trivial risk that should not be ignored.

Mitigation Recommendations

1. Restrict and monitor local access to NVIDIA DGX Spark systems, ensuring only trusted administrators have high privilege accounts. 2. Implement strict access controls and network segmentation to limit exposure of DGX Spark hardware to potentially untrusted users or systems. 3. Monitor firmware integrity and system logs for unusual behavior indicative of exploitation attempts or memory corruption. 4. Prepare for prompt deployment of the OTA0 firmware update once released by NVIDIA to remediate the vulnerability. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous firmware or kernel-level activities. 6. Conduct regular security audits and privilege reviews to minimize the risk of insider threats or credential compromise. 7. Consider implementing hardware-based security features such as secure boot and firmware validation to reduce the risk of firmware tampering. 8. Educate system administrators on the risks associated with firmware vulnerabilities and the importance of applying updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:03.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6925f0bc94b153c6e1167e8f

Added to database: 11/25/2025, 6:09:00 PM

Last enriched: 12/2/2025, 6:46:30 PM

Last updated: 12/3/2025, 2:56:57 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats