Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33195: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in NVIDIA DGX Spark

0
Medium
VulnerabilityCVE-2025-33195cvecve-2025-33195cwe-119
Published: Tue Nov 25 2025 (11/25/2025, 17:59:42 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DGX Spark

Description

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause unexpected memory buffer operations. A successful exploit of this vulnerability might lead to data tampering, denial of service, or escalation of privileges.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:46:41 UTC

Technical Analysis

CVE-2025-33195 identifies a vulnerability in the SROOT firmware component of NVIDIA DGX Spark GB10 systems, specifically related to improper restriction of operations within the bounds of a memory buffer (CWE-119). This type of vulnerability typically arises when software fails to adequately validate memory operations, allowing an attacker to perform out-of-bounds reads or writes. In this case, the flaw could enable an attacker with low-level privileges and local access to cause unexpected memory buffer operations, potentially leading to data tampering, denial of service (DoS), or escalation of privileges. The vulnerability affects all versions of the DGX Spark prior to the OTA0 firmware update. The CVSS 3.1 base score is 4.4, reflecting a medium severity with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and limited availability impact (A:L). No known exploits have been reported in the wild, indicating that active exploitation is not currently observed. The DGX Spark platform is used primarily in high-performance computing and AI workloads, making the integrity and availability of these systems critical. The vulnerability's exploitation could disrupt operations or allow attackers to manipulate data or escalate privileges within the system, potentially compromising the security posture of affected environments.

Potential Impact

For European organizations, particularly those engaged in AI research, scientific computing, or data-intensive workloads relying on NVIDIA DGX Spark systems, this vulnerability poses risks to data integrity and system availability. Exploitation could lead to unauthorized modification of data, disruption of critical computational tasks, or unauthorized privilege escalation, which may result in operational downtime or compromised research outputs. Given the local access requirement, insider threats or attackers who have gained initial footholds could leverage this vulnerability to deepen their access or disrupt services. The medium severity suggests that while the threat is not critical, it can still cause meaningful harm if left unaddressed. Organizations with high-value AI workloads or sensitive data processed on DGX Spark systems should prioritize mitigation to maintain trustworthiness and continuity of their computational environments.

Mitigation Recommendations

1. Apply the OTA0 firmware update from NVIDIA as soon as it becomes available to remediate the vulnerability. 2. Restrict physical and local access to DGX Spark systems to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict access controls and monitoring on systems running DGX Spark to detect and prevent unauthorized local activity. 4. Employ host-based intrusion detection systems (HIDS) to monitor for anomalous memory operations or privilege escalation attempts. 5. Conduct regular audits of user privileges and system logs to identify potential misuse or early signs of exploitation. 6. Segregate DGX Spark systems within secure network segments to limit lateral movement in case of compromise. 7. Educate system administrators and users about the risks associated with local access vulnerabilities and enforce strong operational security practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:03.729Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6925f0bc94b153c6e1167ea8

Added to database: 11/25/2025, 6:09:00 PM

Last enriched: 12/2/2025, 6:46:41 PM

Last updated: 1/10/2026, 10:14:36 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats