Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33202: CWE-121 Stack-based Buffer Overflow in NVIDIA Triton Inference Server

0
Medium
VulnerabilityCVE-2025-33202cvecve-2025-33202cwe-121
Published: Tue Nov 11 2025 (11/11/2025, 16:19:13 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Triton Inference Server

Description

NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where an attacker could cause a stack overflow by sending extra-large payloads. A successful exploit of this vulnerability might lead to denial of service.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:00:34 UTC

Technical Analysis

CVE-2025-33202 identifies a stack-based buffer overflow vulnerability in NVIDIA Triton Inference Server, a widely used AI model serving platform deployed on Linux and Windows. The flaw arises when the server processes excessively large payloads sent by an attacker, leading to a stack overflow condition. This vulnerability is classified under CWE-121, indicating improper handling of buffer boundaries on the stack. Exploitation requires network access and low privileges, but no user interaction is necessary. Successful exploitation results in denial of service by crashing or destabilizing the server process, potentially interrupting AI inference workloads. The vulnerability affects all Triton Inference Server versions prior to 25.09, with no patches currently published. The CVSS 3.1 base score of 6.5 reflects a medium severity, driven by network attack vector, low attack complexity, and the impact limited to availability. No confidentiality or integrity impacts are reported. No known exploits have been observed in the wild, but the vulnerability poses a risk to organizations relying on Triton for AI inference services, especially in environments where uptime and reliability are critical. The technical details confirm the vulnerability was reserved in April 2025 and published in November 2025, with NVIDIA as the assigner.

Potential Impact

For European organizations, the primary impact is service disruption due to denial of service on AI inference workloads powered by NVIDIA Triton Inference Server. This can affect sectors relying on AI-driven applications such as autonomous vehicles, healthcare diagnostics, financial services, and manufacturing automation. Interruptions could lead to operational delays, degraded service quality, and potential financial losses. Since the vulnerability does not compromise data confidentiality or integrity, direct data breaches are unlikely. However, availability impacts can cascade, affecting dependent systems and business processes. Organizations with large-scale AI deployments or those providing AI-as-a-service are at higher risk. The medium severity rating suggests moderate urgency but should not be underestimated given the critical role of AI inference in digital transformation initiatives across Europe.

Mitigation Recommendations

1. Apply the official patch or upgrade to NVIDIA Triton Inference Server version 25.09 or later as soon as it becomes available. 2. Until patches are deployed, restrict network access to the Triton server using firewalls or network segmentation to limit exposure to trusted users and systems only. 3. Implement input validation and payload size restrictions at the network perimeter or application gateway to block abnormally large requests. 4. Monitor server logs and network traffic for unusual payload sizes or repeated malformed requests that could indicate exploitation attempts. 5. Employ runtime protections such as stack canaries or address space layout randomization (ASLR) if supported by the deployment environment to mitigate buffer overflow impacts. 6. Conduct regular security assessments and penetration testing focused on AI infrastructure to identify and remediate similar vulnerabilities proactively. 7. Establish incident response plans specific to AI service disruptions to minimize downtime in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:05.243Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69136629f922b639ab60127f

Added to database: 11/11/2025, 4:36:57 PM

Last enriched: 11/18/2025, 7:00:34 PM

Last updated: 11/22/2025, 1:00:37 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats