CVE-2025-33198: CWE-226 Sensitive Information in Resource Not Removed Before Reuse in NVIDIA DGX Spark
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.
AI Analysis
Technical Summary
CVE-2025-33198 identifies a vulnerability in the SROOT firmware component of NVIDIA DGX Spark GB10 systems, specifically related to improper handling of sensitive information in resources that are reused. The vulnerability is categorized under CWE-226, which involves sensitive information not being removed before resource reuse, potentially leading to information disclosure. The flaw exists in all versions of the DGX Spark prior to the OTA0 firmware update. An attacker with low-level privileges and local access could exploit this vulnerability to access residual sensitive data left in reused resources, such as memory buffers or storage segments, that were not properly sanitized. The vulnerability does not affect system integrity or availability, nor does it require user interaction, but it compromises confidentiality to a limited extent. The CVSS 3.1 base score is 3.3, reflecting low severity due to the requirement for local access and limited impact. No public exploits have been reported, and NVIDIA has reserved the CVE since April 2025, publishing details in November 2025. The lack of a patch link suggests that a firmware update (OTA0) will address the issue. This vulnerability is particularly relevant for organizations relying on DGX Spark systems for AI, machine learning, or high-performance computing workloads, where sensitive data confidentiality is critical.
Potential Impact
The primary impact of CVE-2025-33198 is the potential disclosure of sensitive information residing in reused resources within the DGX Spark system's firmware. For European organizations, especially those engaged in AI research, data analytics, or HPC tasks using NVIDIA DGX Spark, this could lead to exposure of proprietary algorithms, datasets, or confidential operational data. Although the vulnerability does not allow remote exploitation and requires local access with low privileges, insider threats or compromised local accounts could leverage this flaw to extract sensitive information. The limited scope and low severity reduce the likelihood of widespread disruption, but in regulated industries such as finance, healthcare, or defense, even minor data leaks can have compliance and reputational consequences. The absence of known exploits in the wild lowers immediate risk, but the presence of this vulnerability in critical AI infrastructure warrants proactive mitigation to prevent potential lateral movement or data leakage within secure environments.
Mitigation Recommendations
To mitigate CVE-2025-33198, European organizations should: 1) Monitor NVIDIA communications and apply the OTA0 firmware update promptly once released, as this update is expected to address the vulnerability. 2) Restrict local access to DGX Spark systems strictly to authorized and trusted personnel, implementing strong access controls and monitoring for unusual activity. 3) Employ endpoint security solutions on systems interfacing with DGX Spark to detect potential insider threats or unauthorized access attempts. 4) Conduct regular audits of user privileges and session logs to identify and respond to suspicious behavior quickly. 5) Isolate DGX Spark environments within secure network segments to limit exposure. 6) Educate staff on the risks of local privilege misuse and enforce policies to minimize the risk of insider exploitation. These targeted actions go beyond generic advice by focusing on the specific access requirements and operational context of the DGX Spark platform.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-2025-33198: CWE-226 Sensitive Information in Resource Not Removed Before Reuse in NVIDIA DGX Spark
Description
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2025-33198 identifies a vulnerability in the SROOT firmware component of NVIDIA DGX Spark GB10 systems, specifically related to improper handling of sensitive information in resources that are reused. The vulnerability is categorized under CWE-226, which involves sensitive information not being removed before resource reuse, potentially leading to information disclosure. The flaw exists in all versions of the DGX Spark prior to the OTA0 firmware update. An attacker with low-level privileges and local access could exploit this vulnerability to access residual sensitive data left in reused resources, such as memory buffers or storage segments, that were not properly sanitized. The vulnerability does not affect system integrity or availability, nor does it require user interaction, but it compromises confidentiality to a limited extent. The CVSS 3.1 base score is 3.3, reflecting low severity due to the requirement for local access and limited impact. No public exploits have been reported, and NVIDIA has reserved the CVE since April 2025, publishing details in November 2025. The lack of a patch link suggests that a firmware update (OTA0) will address the issue. This vulnerability is particularly relevant for organizations relying on DGX Spark systems for AI, machine learning, or high-performance computing workloads, where sensitive data confidentiality is critical.
Potential Impact
The primary impact of CVE-2025-33198 is the potential disclosure of sensitive information residing in reused resources within the DGX Spark system's firmware. For European organizations, especially those engaged in AI research, data analytics, or HPC tasks using NVIDIA DGX Spark, this could lead to exposure of proprietary algorithms, datasets, or confidential operational data. Although the vulnerability does not allow remote exploitation and requires local access with low privileges, insider threats or compromised local accounts could leverage this flaw to extract sensitive information. The limited scope and low severity reduce the likelihood of widespread disruption, but in regulated industries such as finance, healthcare, or defense, even minor data leaks can have compliance and reputational consequences. The absence of known exploits in the wild lowers immediate risk, but the presence of this vulnerability in critical AI infrastructure warrants proactive mitigation to prevent potential lateral movement or data leakage within secure environments.
Mitigation Recommendations
To mitigate CVE-2025-33198, European organizations should: 1) Monitor NVIDIA communications and apply the OTA0 firmware update promptly once released, as this update is expected to address the vulnerability. 2) Restrict local access to DGX Spark systems strictly to authorized and trusted personnel, implementing strong access controls and monitoring for unusual activity. 3) Employ endpoint security solutions on systems interfacing with DGX Spark to detect potential insider threats or unauthorized access attempts. 4) Conduct regular audits of user privileges and session logs to identify and respond to suspicious behavior quickly. 5) Isolate DGX Spark environments within secure network segments to limit exposure. 6) Educate staff on the risks of local privilege misuse and enforce policies to minimize the risk of insider exploitation. These targeted actions go beyond generic advice by focusing on the specific access requirements and operational context of the DGX Spark platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2025-04-15T18:51:05.242Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6925f3dfea01c5f8b83011f9
Added to database: 11/25/2025, 6:22:23 PM
Last enriched: 12/2/2025, 6:50:00 PM
Last updated: 12/4/2025, 9:08:59 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66573: CWE-319 Cleartext Transmission of Sensitive Information in mersive Solstice Pod API Session Key Extraction via API Endpoint
MediumCVE-2025-66572: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in loadedcommerce Loaded Commerce
MediumCVE-2025-66571: CWE-502: Deserialization of Untrusted Data in UNA CMS
CriticalCVE-2025-66555: CWE-306: Missing Authentication for Critical Function in airkeyboardapp AirKeyboard iOS App
HighCVE-2025-63896: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.