Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33228: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit

0
High
VulnerabilityCVE-2025-33228cvecve-2025-33228cwe-78
Published: Tue Jan 20 2026 (01/20/2026, 17:44:19 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: CUDA Toolkit

Description

NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli.py script if the script is invoked manually. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:15:19 UTC

Technical Analysis

CVE-2025-33228 is an OS command injection vulnerability classified under CWE-78 found in NVIDIA Nsight Systems, a performance analysis tool within the CUDA Toolkit. The vulnerability resides in the gfx_hotspot recipe, specifically in the process_nsys_rep_cli.py script. When this script is invoked manually, it improperly neutralizes special elements in input strings, allowing an attacker to inject arbitrary OS commands. Successful exploitation can lead to arbitrary code execution, escalation of privileges, tampering with data, denial of service conditions, and unauthorized information disclosure. The vulnerability affects all versions of the CUDA Toolkit prior to 13.1. The CVSS v3.1 score is 7.3, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where the script is manually invoked, such as during custom performance analysis workflows or automated scripts that call this tool. The vulnerability highlights the risk of improper input sanitization in command-line tools that interact with OS commands, especially in specialized software like GPU performance analysis suites.

Potential Impact

The impact of this vulnerability is substantial for organizations relying on NVIDIA CUDA Toolkit and Nsight Systems for GPU-accelerated computing, including sectors such as artificial intelligence, scientific research, high-performance computing, and data centers. Exploitation could allow attackers with local access to execute arbitrary commands with the privileges of the user running the script, potentially escalating privileges further. This could lead to unauthorized modification or deletion of critical data, disruption of GPU-accelerated workloads, and exposure of sensitive information. Denial of service conditions could impair performance analysis and debugging activities, delaying development and operational processes. Since the vulnerability requires manual invocation of the vulnerable script, the risk is higher in environments where users or automated systems run this script frequently. The overall operational security posture could be compromised, especially in multi-user systems or shared computing environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade to CUDA Toolkit version 13.1 or later, where the issue is resolved. Until patching is possible, restrict access to the process_nsys_rep_cli.py script to trusted users only and avoid manual invocation with untrusted input. Implement strict input validation and sanitization controls on any scripts or automation that invoke this tool. Employ the principle of least privilege to limit user permissions on systems running Nsight Systems. Monitor logs for unusual invocations of the gfx_hotspot recipe or the process_nsys_rep_cli.py script. Consider isolating GPU performance analysis environments from critical production systems to reduce risk exposure. Additionally, educate users about the risks of running scripts with untrusted input and enforce multi-factor authentication and endpoint security controls to reduce the likelihood of local privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:07.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fc0884623b1157c42b9e6

Added to database: 1/20/2026, 5:51:04 PM

Last enriched: 2/27/2026, 8:15:19 AM

Last updated: 3/25/2026, 4:49:00 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses