Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33220: CWE-416 Use After Free in NVIDIA GeForce

0
High
VulnerabilityCVE-2025-33220cvecve-2025-33220cwe-416
Published: Wed Jan 28 2026 (01/28/2026, 17:48:40 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: GeForce

Description

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:21:10 UTC

Technical Analysis

CVE-2025-33220 is a use-after-free vulnerability classified under CWE-416 found in the Virtual GPU Manager component of NVIDIA's vGPU software, specifically impacting GeForce drivers prior to version 590.48.01. The vulnerability arises when a malicious guest virtual machine triggers heap memory access after the memory has been freed, leading to undefined behavior. This can be exploited to execute arbitrary code within the context of the host or hypervisor, escalate privileges beyond the guest VM, tamper with data, cause denial of service by crashing the GPU manager, or disclose sensitive information from memory. The flaw requires the attacker to have local access to the virtualized environment with low privileges but does not require user interaction, making it a potent threat in multi-tenant or cloud environments where NVIDIA vGPU technology is deployed. The vulnerability affects confidentiality, integrity, and availability, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to compromise the host system from a guest VM. The vulnerability was publicly disclosed on January 28, 2026, and NVIDIA has released driver version 590.48.01 to address this issue. The lack of patch links in the provided data suggests organizations should verify and obtain the update directly from NVIDIA's official channels. This vulnerability is particularly relevant for organizations leveraging NVIDIA GeForce GPUs in virtualized or cloud environments where vGPU technology is used to share GPU resources among multiple tenants or users.

Potential Impact

The impact of CVE-2025-33220 is substantial for organizations using NVIDIA GeForce drivers with vGPU technology in virtualized environments. Successful exploitation can lead to complete compromise of the host system from a guest VM, enabling attackers to execute arbitrary code with escalated privileges. This threatens the confidentiality of sensitive data processed or stored on the host, the integrity of system and application data, and the availability of GPU resources and dependent services. In multi-tenant cloud or enterprise environments, this vulnerability could allow attackers to break isolation boundaries, potentially affecting multiple tenants or users. The denial of service impact could disrupt critical workloads relying on GPU acceleration, affecting business continuity. Given the widespread use of NVIDIA GPUs in gaming, professional visualization, AI, and cloud computing, the vulnerability poses a risk to a broad range of sectors including technology, finance, healthcare, and government. The requirement for local access limits remote exploitation but does not eliminate risk in environments where attackers can gain guest VM access, such as compromised cloud accounts or insider threats.

Mitigation Recommendations

Organizations should immediately verify their NVIDIA GeForce driver versions and upgrade to version 590.48.01 or later to remediate the vulnerability. In virtualized environments, ensure that all guest VMs and host systems are updated to prevent exploitation. Restrict and monitor access to virtual machines to reduce the risk of malicious guest activity. Implement strict access controls and network segmentation to limit lateral movement if a guest VM is compromised. Employ runtime monitoring and anomaly detection tools to identify suspicious behavior related to GPU manager processes. Regularly audit and harden virtualization infrastructure configurations, including hypervisor and vGPU settings. Coordinate with NVIDIA support for any additional security advisories or patches. For environments where immediate patching is not feasible, consider disabling vGPU features or isolating vulnerable systems until updates can be applied. Maintain comprehensive backup and incident response plans to mitigate potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:06.915Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a50074623b1157cdfcf50

Added to database: 1/28/2026, 6:05:59 PM

Last enriched: 2/27/2026, 7:21:10 AM

Last updated: 3/24/2026, 1:01:47 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses