Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit

0
High
VulnerabilityCVE-2025-33230cvecve-2025-33230cwe-78
Published: Tue Jan 20 2026 (01/20/2026, 17:55:28 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: CUDA Toolkit

Description

CVE-2025-33230 is a high-severity OS command injection vulnerability in the NVIDIA CUDA Toolkit's Nsight Systems Linux installer (. run file). An attacker supplying a malicious installation path string can exploit this flaw to execute arbitrary OS commands with limited privileges, potentially leading to privilege escalation, code execution, data tampering, denial of service, and information disclosure. This vulnerability affects all CUDA Toolkit versions prior to 13. 1. Exploitation requires local access with limited privileges and user interaction during installation. No known exploits are currently in the wild. European organizations using NVIDIA CUDA Toolkit on Linux systems, especially in research, AI, and HPC sectors, should prioritize patching or upgrading to version 13. 1 or later to mitigate risks. Countries with significant technology and research infrastructure are most likely to be impacted.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:17:29 UTC

Technical Analysis

CVE-2025-33230 is an OS command injection vulnerability classified under CWE-78 found in the NVIDIA CUDA Toolkit, specifically within the Nsight Systems installer for Linux (.run installer). The vulnerability arises due to improper neutralization of special elements in the installation path input, allowing an attacker to inject malicious OS commands. When a user runs the installer and provides a crafted installation path containing malicious strings, these commands can be executed with the privileges of the installer process. The vulnerability affects all versions prior to CUDA Toolkit 13.1. The CVSS v3.1 score is 7.3 (high), with vector AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, requiring limited privileges and user interaction, with high impact on confidentiality, integrity, and availability. Exploitation could lead to escalation of privileges, arbitrary code execution, data tampering, denial of service, and information disclosure. No public exploits are known yet, but the risk is significant given the widespread use of CUDA in AI, HPC, and scientific computing environments. The vulnerability is particularly critical in multi-user Linux environments where CUDA is installed, as attackers with limited access could leverage this flaw to gain higher privileges or disrupt systems.

Potential Impact

For European organizations, the impact of CVE-2025-33230 can be substantial, especially in sectors relying heavily on NVIDIA CUDA Toolkit for AI research, scientific computing, and high-performance computing clusters. Successful exploitation could allow attackers to escalate privileges from a limited user account to higher system privileges, enabling unauthorized code execution and potential full system compromise. This could lead to data tampering, theft of sensitive intellectual property, disruption of critical computational workloads, and denial of service. Organizations running multi-user Linux environments with CUDA installations are at higher risk. The confidentiality, integrity, and availability of systems and data could be severely affected, impacting research outputs, commercial AI development, and critical infrastructure relying on GPU-accelerated computing.

Mitigation Recommendations

European organizations should immediately verify if their systems run affected versions of the NVIDIA CUDA Toolkit on Linux. The primary mitigation is to upgrade to CUDA Toolkit version 13.1 or later, where this vulnerability has been addressed. Until patching is possible, restrict access to systems where the CUDA installer might be run, especially limiting local user permissions to trusted personnel only. Employ strict input validation and sanitization if custom installation scripts or automation tools are used. Monitor installation activities and system logs for suspicious command execution or privilege escalation attempts. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behaviors related to installer execution. Educate system administrators about the risks of running untrusted installers and the importance of verifying installation paths. Finally, maintain regular backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:07.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fc4054623b1157c437283

Added to database: 1/20/2026, 6:05:57 PM

Last enriched: 1/27/2026, 8:17:29 PM

Last updated: 2/7/2026, 3:34:06 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats