Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33190: CWE-787 Out-of-bounds Write in NVIDIA DGX Spark

0
Medium
VulnerabilityCVE-2025-33190cvecve-2025-33190cwe-787
Published: Tue Nov 25 2025 (11/25/2025, 17:58:19 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DGX Spark

Description

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or escalation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:34:10 UTC

Technical Analysis

CVE-2025-33190 is a security vulnerability identified in the SROOT firmware component of NVIDIA DGX Spark GB10 systems. The flaw is classified as CWE-787, an out-of-bounds write, which occurs when the firmware improperly handles memory boundaries, allowing an attacker to write data outside the intended buffer. This can corrupt memory, potentially leading to arbitrary code execution, data tampering, denial of service (DoS), or privilege escalation. The vulnerability affects all DGX Spark versions prior to the OTA0 update. The CVSS v3.1 base score is 6.7, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation requires an attacker to have already obtained high-level privileges on the system, meaning initial access control is critical. No public exploits or active exploitation have been reported to date. The vulnerability resides in firmware, which is a low-level software layer, making exploitation potentially impactful and difficult to detect. The lack of available patches at the time of reporting necessitates immediate risk mitigation through operational controls. NVIDIA DGX Spark systems are specialized AI and data center hardware used in high-performance computing environments, making this vulnerability particularly relevant to organizations leveraging such infrastructure for AI workloads.

Potential Impact

The potential impact of CVE-2025-33190 is significant for organizations using NVIDIA DGX Spark systems. Successful exploitation could allow attackers to execute arbitrary code at the firmware level, leading to complete system compromise. This could result in unauthorized data access or modification, disruption of AI workloads through denial of service, and escalation of privileges that bypass existing security controls. Given the critical role of DGX Spark in AI research, data analytics, and high-performance computing, such an attack could disrupt business operations, compromise sensitive research data, and damage organizational reputation. The requirement for high privileges limits the attack surface but also means that insider threats or attackers who have already breached perimeter defenses could leverage this vulnerability to deepen their access. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released. Overall, the vulnerability poses a medium risk but with potentially high consequences in targeted environments.

Mitigation Recommendations

1. Apply Firmware Updates: Monitor NVIDIA advisories closely and apply the OTA0 firmware update as soon as it becomes available to remediate the vulnerability. 2. Restrict Access: Limit local access to DGX Spark systems to trusted administrators only, enforcing strict access controls and multi-factor authentication to reduce the risk of privilege escalation. 3. Monitor Systems: Implement enhanced monitoring and logging on DGX Spark devices to detect unusual activities indicative of exploitation attempts, such as unexpected firmware behavior or privilege escalations. 4. Network Segmentation: Isolate DGX Spark systems within secure network segments to minimize exposure to potentially compromised hosts. 5. Insider Threat Mitigation: Conduct regular audits of privileged user activities and enforce least privilege principles to reduce the risk of misuse by insiders. 6. Incident Response Preparation: Develop and test incident response plans specific to DGX Spark environments to enable rapid containment and recovery in case of exploitation. 7. Vendor Engagement: Engage with NVIDIA support channels for guidance and early access to patches or workarounds. 8. Firmware Integrity Checks: Where possible, implement firmware integrity verification mechanisms to detect unauthorized modifications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:03.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6925f0bc94b153c6e1167e8f

Added to database: 11/25/2025, 6:09:00 PM

Last enriched: 2/27/2026, 6:34:10 AM

Last updated: 3/23/2026, 7:31:18 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses