Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33216: CWE-131 Incorrect Calculation of Buffer Size in NVIDIA SNAP-4 Container

0
Medium
VulnerabilityCVE-2025-33216cvecve-2025-33216cwe-131
Published: Tue Mar 24 2026 (03/24/2026, 20:21:46 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: SNAP-4 Container

Description

NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface where an attacker on a VM may cause an incorrect calculation of buffer size by sending crafted configurations. A successful exploit of this vulnerability may lead to crash of the SNAP service, causing denial of service of the storage service to the host.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 20:51:31 UTC

Technical Analysis

CVE-2025-33216 is a vulnerability identified in NVIDIA's SNAP-4 Container, specifically in the configuration interface where buffer sizes are incorrectly calculated due to improper handling of crafted configuration data. This vulnerability is classified under CWE-131, which relates to incorrect calculation of buffer size leading to potential buffer overflows or memory corruption. An attacker with limited privileges on a virtual machine hosting the SNAP-4 Container can send specially crafted configuration data that triggers this miscalculation. The result is a crash of the SNAP service, which manages storage services for the host system. The vulnerability affects all versions prior to SNAP-4.9.0 and SNAP-4.5.5. The CVSS v3.1 score is 6.8, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, but the potential for denial of service in critical storage services makes this a significant concern in virtualized and GPU-accelerated environments where SNAP-4 Containers are deployed.

Potential Impact

The primary impact of this vulnerability is denial of service (DoS) caused by the crash of the SNAP service, which manages storage services on the host. This can lead to disruption of storage availability for applications relying on NVIDIA SNAP-4 Containers, potentially causing downtime or degraded performance in GPU-accelerated virtualized environments. Organizations using SNAP-4 Containers in cloud infrastructure, AI/ML workloads, or high-performance computing may experience interruptions in critical storage services. Although confidentiality and integrity are not directly affected, the loss of availability can impact business continuity, service level agreements, and operational efficiency. The requirement for attacker presence on a VM limits the attack surface but does not eliminate risk in multi-tenant or shared environments. The scope change in CVSS indicates that the vulnerability can affect components beyond the initially compromised VM, potentially impacting the host system's storage services.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade NVIDIA SNAP-4 Containers to versions 4.9.0 or 4.5.5 or later, where the buffer size calculation issue has been addressed. Until patches are applied, restrict and monitor access to virtual machines running SNAP-4 Containers to prevent unauthorized or low-privilege users from sending crafted configuration data. Implement strict network segmentation and access controls to limit the attacker's ability to reach the configuration interface. Employ runtime monitoring and anomaly detection to identify unusual configuration changes or service crashes. Regularly audit and review VM privilege assignments to minimize the number of users with sufficient rights to exploit this vulnerability. Additionally, maintain up-to-date backups and disaster recovery plans to quickly restore storage services in case of a denial of service event.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:06.914Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2f481f4197a8e3b7561cc

Added to database: 3/24/2026, 8:30:57 PM

Last enriched: 3/24/2026, 8:51:31 PM

Last updated: 3/24/2026, 9:50:17 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses