Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33218: CWE-190 Integer Overflow or Wraparound in NVIDIA GeForce

0
High
VulnerabilityCVE-2025-33218cvecve-2025-33218cwe-190
Published: Wed Jan 28 2026 (01/28/2026, 17:47:25 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GeForce

Description

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AI-Powered Analysis

AILast updated: 01/28/2026, 18:20:48 UTC

Technical Analysis

CVE-2025-33218 is an integer overflow vulnerability classified under CWE-190 found in the NVIDIA GeForce GPU Display Driver for Windows, specifically within the kernel mode driver component nvlddmkm.sys. The vulnerability arises due to improper handling of integer values, which can wrap around and lead to memory corruption or unexpected behavior. An attacker with local access and low privileges can exploit this flaw to execute arbitrary code in kernel mode, thereby escalating privileges beyond their initial access level. This can result in unauthorized data modification, denial of service by crashing the driver or system, or information disclosure through memory leaks or corrupted data. The vulnerability affects all driver versions prior to 591.59, indicating a broad impact across many systems using NVIDIA GeForce GPUs on Windows platforms. The CVSS v3.1 score of 7.8 reflects a high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for serious damage exists given the kernel-level execution capability. The vulnerability was reserved in April 2025 and published in January 2026, suggesting a recent discovery and disclosure. The lack of patch links indicates that users should monitor NVIDIA’s official channels for the release of the fixed driver version 591.59 or later. Given the critical role of GPU drivers in system stability and security, this vulnerability demands immediate attention from affected users and organizations.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying heavily on Windows-based workstations with NVIDIA GeForce GPUs, such as gaming, digital content creation, engineering, and scientific research. Exploitation could lead to unauthorized code execution at the kernel level, allowing attackers to bypass security controls, access sensitive data, or disrupt critical operations. This could result in data breaches, intellectual property theft, or operational downtime. The high impact on confidentiality, integrity, and availability means that both private enterprises and public institutions could suffer severe consequences. Organizations with large numbers of affected devices are at increased risk of widespread compromise. Additionally, the local attack vector implies that insider threats or malware with limited privileges could leverage this vulnerability to escalate privileges and gain persistent control. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as exploit development could follow disclosure. European organizations must prioritize patching and monitoring to mitigate potential attacks.

Mitigation Recommendations

1. Immediately plan and deploy updates to NVIDIA GeForce drivers version 591.59 or later once officially released by NVIDIA to address CVE-2025-33218. 2. Until patches are available, restrict local user privileges to the minimum necessary, preventing untrusted users from executing code or installing software on affected systems. 3. Implement application whitelisting and endpoint protection solutions that can detect anomalous behavior related to GPU driver exploitation. 4. Monitor system logs and GPU driver events for unusual activity, such as unexpected crashes or privilege escalations. 5. Use network segmentation to isolate critical systems that utilize NVIDIA GPUs, reducing the risk of lateral movement if exploitation occurs. 6. Educate IT and security teams about this vulnerability to ensure rapid response and awareness. 7. Coordinate with hardware and software vendors to stay informed about patch availability and additional mitigation guidance. 8. Consider deploying host-based intrusion detection systems (HIDS) that can alert on kernel-level anomalies related to GPU drivers. 9. Review and harden local access policies, especially on shared or multi-user systems, to limit exposure to local attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:06.915Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a50074623b1157cdfcf46

Added to database: 1/28/2026, 6:05:59 PM

Last enriched: 1/28/2026, 6:20:48 PM

Last updated: 2/6/2026, 9:12:28 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats