Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33238: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in NVIDIA Triton Inference Server

0
High
VulnerabilityCVE-2025-33238cvecve-2025-33238cwe-362
Published: Tue Mar 24 2026 (03/24/2026, 20:25:57 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Triton Inference Server

Description

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 20:51:20 UTC

Technical Analysis

CVE-2025-33238 identifies a race condition vulnerability classified under CWE-362 in the NVIDIA Triton Inference Server, specifically within its Sagemaker HTTP server component. The vulnerability stems from improper synchronization when handling concurrent execution of shared resources, which can lead to an exception being thrown. This exception can cause the server to crash or become unresponsive, resulting in a denial of service (DoS) condition. The flaw affects all versions of the Triton Inference Server prior to 26.01. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, making it relatively easy for attackers to trigger. Although no exploits have been observed in the wild to date, the CVSS v3.1 score of 7.5 reflects a high severity due to the potential impact on availability and the ease of exploitation. The vulnerability does not impact confidentiality or integrity, focusing solely on availability disruption. The lack of a patch link indicates that a fix may be forthcoming or included in version 26.01. Organizations using Triton for AI inference workloads, especially those exposed to untrusted networks, are at risk of service interruptions. The vulnerability highlights the importance of proper concurrency controls in multi-threaded server environments handling AI inference requests.

Potential Impact

The primary impact of CVE-2025-33238 is denial of service, which can disrupt AI inference services relying on NVIDIA Triton Inference Server. This disruption can affect business-critical applications such as real-time analytics, autonomous systems, and cloud-based AI services, leading to downtime and potential loss of revenue or operational capability. Since the vulnerability does not compromise data confidentiality or integrity, the risk is confined to availability. However, given the increasing reliance on AI inference servers in sectors like finance, healthcare, manufacturing, and autonomous vehicles, even temporary service outages can have cascading effects on dependent systems and processes. Organizations with large-scale deployments or those providing AI inference as a service are particularly vulnerable to operational disruptions. The ease of remote exploitation without authentication increases the threat landscape, especially for publicly accessible Triton servers. This could also be leveraged as part of a broader attack to degrade AI capabilities or cause reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-33238, organizations should prioritize upgrading NVIDIA Triton Inference Server to version 26.01 or later once the patch is officially released. Until then, restricting network access to the Sagemaker HTTP server component is critical; implement network segmentation and firewall rules to limit exposure to trusted clients only. Employ strict authentication and authorization mechanisms where possible to reduce attack surface. Monitor server logs and performance metrics for signs of abnormal exceptions or crashes indicative of exploitation attempts. Consider deploying rate limiting or request throttling to mitigate rapid concurrent requests that could trigger the race condition. Additionally, review and harden concurrency controls and resource management policies in the deployment environment. For cloud deployments, leverage provider-specific security groups and virtual private clouds to isolate Triton servers. Finally, maintain an incident response plan to quickly address any service disruptions caused by exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:08.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2f481f4197a8e3b7561d1

Added to database: 3/24/2026, 8:30:57 PM

Last enriched: 3/24/2026, 8:51:20 PM

Last updated: 3/25/2026, 12:40:07 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses