Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit

0
High
VulnerabilityCVE-2025-33230cvecve-2025-33230cwe-78
Published: Tue Jan 20 2026 (01/20/2026, 17:55:28 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: CUDA Toolkit

Description

NVIDIA Nsight Systems for Linux contains a vulnerability in the .run installer, where an attacker could cause an OS command injection by supplying a malicious string to the installation path. A successful exploit of this vulnerability might lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.

AI-Powered Analysis

AILast updated: 01/20/2026, 18:20:19 UTC

Technical Analysis

CVE-2025-33230 is an OS command injection vulnerability classified under CWE-78, found in the NVIDIA CUDA Toolkit's Linux .run installer component, specifically within Nsight Systems. The vulnerability arises because the installer improperly neutralizes special characters in the installation path parameter, allowing an attacker to inject and execute arbitrary OS commands. This flaw can be exploited by providing a crafted malicious string as the installation path during the setup process. Successful exploitation can lead to multiple severe consequences, including escalation of privileges from a limited user context, arbitrary code execution on the host system, tampering with critical data, denial of service by disrupting normal operations, and unauthorized information disclosure. The vulnerability affects all versions of the CUDA Toolkit prior to 13.1, which means systems running older versions are at risk. The CVSS v3.1 base score is 7.3 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability, combined with the requirement for local access with low privileges, low attack complexity, and user interaction during installation. No public exploits have been reported yet, but the potential impact warrants immediate attention. The vulnerability was reserved in April 2025 and published in January 2026, indicating recent discovery and disclosure. Since the attack vector is local and requires user interaction, the threat is primarily to environments where untrusted users have shell access or where installation scripts might be run without strict controls. The improper sanitization of input in the installer script is the root cause, highlighting the need for secure coding practices in installation utilities.

Potential Impact

For European organizations, especially those in technology, research, AI development, and high-performance computing sectors that rely on NVIDIA CUDA Toolkit on Linux platforms, this vulnerability poses a significant risk. Exploitation could allow attackers with limited local access to escalate privileges and execute arbitrary code, potentially compromising sensitive intellectual property, disrupting critical computational workloads, or leaking confidential data. The impact extends to operational continuity, as denial of service conditions could halt important processing tasks. Given the widespread use of NVIDIA GPUs and CUDA in European research institutions, universities, and enterprises, the vulnerability could affect a broad range of targets. Additionally, organizations with multi-tenant or shared computing environments are at higher risk, as attackers could leverage this flaw to move laterally or gain unauthorized control. The requirement for user interaction somewhat limits remote exploitation but does not eliminate risk in environments where users might be tricked into running malicious installers or scripts. The lack of known exploits currently reduces immediate threat but does not diminish the urgency for mitigation due to the high severity and potential impact.

Mitigation Recommendations

European organizations should immediately upgrade all affected NVIDIA CUDA Toolkit installations to version 13.1 or later, where this vulnerability is addressed. Until patching is possible, restrict local user access to trusted personnel only and enforce strict controls on who can execute installer scripts. Implement application whitelisting to prevent unauthorized execution of installation files. Conduct thorough input validation and sanitization in any custom deployment scripts that invoke the CUDA installer. Employ endpoint detection and response (EDR) tools to monitor for suspicious command execution patterns during installation processes. Educate users and administrators about the risks of running installers from untrusted sources or with unverified parameters. For environments with shared or multi-user access, consider isolating CUDA installations to dedicated, secured systems or containers to limit attack surface. Regularly audit and review installation procedures and logs to detect any anomalous activity. Finally, maintain up-to-date backups and incident response plans tailored to potential exploitation scenarios involving privilege escalation and code execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:07.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fc4054623b1157c437283

Added to database: 1/20/2026, 6:05:57 PM

Last enriched: 1/20/2026, 6:20:19 PM

Last updated: 1/20/2026, 7:06:50 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats