Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33198: CWE-226 Sensitive Information in Resource Not Removed Before Reuse in NVIDIA DGX Spark

0
Low
VulnerabilityCVE-2025-33198cvecve-2025-33198cwe-226
Published: Tue Nov 25 2025 (11/25/2025, 18:00:25 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DGX Spark

Description

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:50:00 UTC

Technical Analysis

CVE-2025-33198 identifies a vulnerability in the SROOT firmware component of NVIDIA DGX Spark GB10 systems, specifically related to improper handling of sensitive information in resources that are reused. The vulnerability is categorized under CWE-226, which involves sensitive information not being removed before resource reuse, potentially leading to information disclosure. The flaw exists in all versions of the DGX Spark prior to the OTA0 firmware update. An attacker with low-level privileges and local access could exploit this vulnerability to access residual sensitive data left in reused resources, such as memory buffers or storage segments, that were not properly sanitized. The vulnerability does not affect system integrity or availability, nor does it require user interaction, but it compromises confidentiality to a limited extent. The CVSS 3.1 base score is 3.3, reflecting low severity due to the requirement for local access and limited impact. No public exploits have been reported, and NVIDIA has reserved the CVE since April 2025, publishing details in November 2025. The lack of a patch link suggests that a firmware update (OTA0) will address the issue. This vulnerability is particularly relevant for organizations relying on DGX Spark systems for AI, machine learning, or high-performance computing workloads, where sensitive data confidentiality is critical.

Potential Impact

The primary impact of CVE-2025-33198 is the potential disclosure of sensitive information residing in reused resources within the DGX Spark system's firmware. For European organizations, especially those engaged in AI research, data analytics, or HPC tasks using NVIDIA DGX Spark, this could lead to exposure of proprietary algorithms, datasets, or confidential operational data. Although the vulnerability does not allow remote exploitation and requires local access with low privileges, insider threats or compromised local accounts could leverage this flaw to extract sensitive information. The limited scope and low severity reduce the likelihood of widespread disruption, but in regulated industries such as finance, healthcare, or defense, even minor data leaks can have compliance and reputational consequences. The absence of known exploits in the wild lowers immediate risk, but the presence of this vulnerability in critical AI infrastructure warrants proactive mitigation to prevent potential lateral movement or data leakage within secure environments.

Mitigation Recommendations

To mitigate CVE-2025-33198, European organizations should: 1) Monitor NVIDIA communications and apply the OTA0 firmware update promptly once released, as this update is expected to address the vulnerability. 2) Restrict local access to DGX Spark systems strictly to authorized and trusted personnel, implementing strong access controls and monitoring for unusual activity. 3) Employ endpoint security solutions on systems interfacing with DGX Spark to detect potential insider threats or unauthorized access attempts. 4) Conduct regular audits of user privileges and session logs to identify and respond to suspicious behavior quickly. 5) Isolate DGX Spark environments within secure network segments to limit exposure. 6) Educate staff on the risks of local privilege misuse and enforce policies to minimize the risk of insider exploitation. These targeted actions go beyond generic advice by focusing on the specific access requirements and operational context of the DGX Spark platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:05.242Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6925f3dfea01c5f8b83011f9

Added to database: 11/25/2025, 6:22:23 PM

Last enriched: 12/2/2025, 6:50:00 PM

Last updated: 12/4/2025, 9:08:59 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats