Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33228: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit

0
High
VulnerabilityCVE-2025-33228cvecve-2025-33228cwe-78
Published: Tue Jan 20 2026 (01/20/2026, 17:44:19 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: CUDA Toolkit

Description

CVE-2025-33228 is a high-severity OS command injection vulnerability in NVIDIA Nsight Systems, specifically in the gfx_hotspot recipe's process_nsys_rep_cli. py script. An attacker with limited privileges can exploit this by supplying a malicious string when invoking the script manually, potentially leading to code execution, privilege escalation, data tampering, denial of service, and information disclosure. This affects all CUDA Toolkit versions prior to 13. 1. Exploitation requires local access with some user interaction and low complexity. European organizations using NVIDIA CUDA Toolkit for GPU computing and development are at risk, especially those in research, AI, and HPC sectors. Mitigation involves upgrading to CUDA Toolkit 13. 1 or later, restricting script execution permissions, and monitoring for suspicious local activity. Countries with significant technology and research infrastructure, such as Germany, France, the UK, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:17:00 UTC

Technical Analysis

CVE-2025-33228 is an OS command injection vulnerability classified under CWE-78, found in the NVIDIA Nsight Systems component of the CUDA Toolkit. The vulnerability resides in the gfx_hotspot recipe, specifically within the process_nsys_rep_cli.py script. When this script is invoked manually, it improperly neutralizes special elements in input strings, allowing an attacker to inject arbitrary OS commands. Successful exploitation requires the attacker to have local access with limited privileges and to interact with the system by manually running the vulnerable script. The impact of exploitation includes remote code execution capabilities, escalation of privileges beyond the initial user context, tampering with data, denial of service conditions, and potential leakage of sensitive information. This vulnerability affects all versions of the CUDA Toolkit prior to 13.1, which was released to address this issue. The CVSS v3.1 base score is 7.3, reflecting high severity due to the combination of high impact on confidentiality, integrity, and availability, and relatively low attack complexity, though requiring some user interaction and privileges. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to environments where CUDA Toolkit is used for GPU-accelerated computing, including scientific research, AI development, and high-performance computing clusters.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on NVIDIA CUDA Toolkit in research institutions, universities, AI startups, and enterprises engaged in GPU-accelerated workloads. Exploitation could allow attackers to execute arbitrary commands on affected systems, potentially leading to unauthorized access to sensitive data, disruption of critical computational tasks, and compromise of intellectual property. The escalation of privileges could enable attackers to gain broader control over affected systems, facilitating lateral movement within networks. Denial of service could interrupt ongoing computations and services, causing operational downtime and financial losses. Information disclosure risks threaten confidentiality, especially in sectors handling sensitive or proprietary data. Given the requirement for local access and user interaction, the threat is more pronounced in environments where multiple users have access to development or compute nodes, such as shared HPC clusters or collaborative research facilities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all installations of the NVIDIA CUDA Toolkit to version 13.1 or later, where the vulnerability has been addressed. Until upgrades can be applied, restrict access to the process_nsys_rep_cli.py script by enforcing strict file permissions and limiting execution to trusted administrators only. Implement monitoring and alerting for unusual invocations of this script or unexpected command executions on systems running CUDA Toolkit. Employ endpoint protection solutions capable of detecting suspicious local command injection attempts. Educate users and administrators about the risks of manually invoking this script with untrusted input. In shared environments, consider isolating user sessions and applying the principle of least privilege to minimize the potential impact of exploitation. Regularly audit systems for signs of compromise and ensure that all software dependencies are kept up to date to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:07.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fc0884623b1157c42b9e6

Added to database: 1/20/2026, 5:51:04 PM

Last enriched: 1/27/2026, 8:17:00 PM

Last updated: 2/7/2026, 11:23:36 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats