Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33199: CWE-670 Always-Incorrect Control Flow Implementation in NVIDIA DGX Spark

0
Low
VulnerabilityCVE-2025-33199cvecve-2025-33199cwe-670
Published: Tue Nov 25 2025 (11/25/2025, 18:00:38 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: DGX Spark

Description

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause incorrect control flow behavior. A successful exploit of this vulnerability might lead to data tampering.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:49:47 UTC

Technical Analysis

CVE-2025-33199 identifies a firmware vulnerability in the SROOT component of NVIDIA DGX Spark GB10 systems, which are specialized AI and high-performance computing platforms. The flaw is categorized under CWE-670, indicating an 'Always-Incorrect Control Flow Implementation,' meaning the firmware's control flow logic can be manipulated or behaves incorrectly under certain conditions. This vulnerability allows an attacker with high-level local privileges to induce incorrect control flow, potentially leading to data tampering within the system. The issue does not affect confidentiality or availability directly but compromises the integrity of data processed or stored by the device. The vulnerability affects all DGX Spark versions prior to the OTA0 firmware update. Exploitation requires local access with elevated privileges (PR:H), no user interaction (UI:N), and has low attack vector scope (AV:L), meaning remote exploitation is not feasible. The CVSS v3.1 base score is 3.2, reflecting the limited impact and exploitation complexity. No public exploits or active exploitation campaigns have been reported. Given the critical role of NVIDIA DGX Spark systems in AI workloads, this vulnerability could undermine trust in data integrity if exploited. The lack of a patch link suggests that a firmware update (OTA0) is planned or in development to address this issue.

Potential Impact

For European organizations, especially those engaged in AI research, data analytics, and high-performance computing using NVIDIA DGX Spark systems, this vulnerability poses a risk to data integrity. Data tampering could lead to corrupted AI model training, inaccurate analytics results, or compromised research outputs, potentially affecting decision-making and operational reliability. Although the vulnerability does not expose sensitive data or cause system downtime, the integrity compromise can have cascading effects in environments where data accuracy is critical. The requirement for high privilege local access limits the risk to insider threats or attackers who have already breached perimeter defenses. However, organizations with lax internal access controls or shared computing environments may be more vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is more pronounced in sectors relying heavily on DGX Spark for critical AI workloads, such as research institutions, technology companies, and data centers across Europe.

Mitigation Recommendations

Organizations should prioritize the deployment of the OTA0 firmware update from NVIDIA as soon as it becomes available to remediate this vulnerability. Until the patch is applied, strict access controls must be enforced to limit local high-privilege access to trusted and vetted personnel only. Implement robust monitoring and auditing of privileged user activities on DGX Spark systems to detect any anomalous behavior indicative of exploitation attempts. Segmentation of AI infrastructure networks can reduce the risk of lateral movement by attackers with local access. Employ hardware and firmware integrity verification tools where possible to detect unauthorized modifications. Additionally, organizations should review and harden their insider threat detection programs, given the requirement for high privilege local access. Coordination with NVIDIA support channels for timely updates and advisories is recommended. Finally, maintaining an up-to-date asset inventory of DGX Spark deployments will aid in rapid response and patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:05.242Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6925f3dfea01c5f8b83011fe

Added to database: 11/25/2025, 6:22:23 PM

Last enriched: 12/2/2025, 6:49:47 PM

Last updated: 12/4/2025, 10:01:26 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats