Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33245: CWE-502 Deserialization of Untrusted Data in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-33245cvecve-2025-33245cwe-502
Published: Wed Feb 18 2026 (02/18/2026, 13:55:47 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:17:09 UTC

Technical Analysis

CVE-2025-33245 is a vulnerability classified under CWE-502, which involves the deserialization of untrusted data within the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI and other machine learning models. The flaw exists in all versions prior to 2.6.1 and allows an attacker to craft malicious serialized data that, when processed by the framework, can lead to remote code execution (RCE). The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and only low privileges (PR:L) with some user interaction (UI:R). The vulnerability affects the confidentiality, integrity, and availability of affected systems, as it can lead to unauthorized code execution, privilege escalation, data tampering, and information disclosure. Although no exploits are currently known in the wild, the potential impact is significant given the widespread use of NVIDIA NeMo in AI development environments. The vulnerability highlights the risks inherent in deserializing data without proper validation or sanitization, which can allow attackers to inject malicious payloads. The patch for this vulnerability is included in version 2.6.1 of the NeMo Framework, and users are strongly advised to upgrade. The vulnerability's CVSS v3.1 score of 8.0 reflects its high severity and the broad scope of impact on affected systems.

Potential Impact

The impact of CVE-2025-33245 is substantial for organizations utilizing the NVIDIA NeMo Framework, especially those deploying AI and machine learning models in production or research environments. Exploitation could lead to remote code execution, allowing attackers to run arbitrary commands on affected systems, potentially gaining control over AI workloads and sensitive data. This could result in unauthorized access to proprietary models, training data, or intellectual property, causing significant confidentiality breaches. Integrity of AI models and data could be compromised, leading to corrupted outputs or manipulated model behavior, which is critical in sectors relying on AI for decision-making. Availability could also be affected if attackers disrupt AI services or cause system crashes. The requirement for low privileges and user interaction lowers the barrier for exploitation, increasing risk. Organizations in industries such as technology, finance, healthcare, and autonomous systems that rely heavily on AI frameworks are particularly vulnerable. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within networks, escalating overall organizational risk.

Mitigation Recommendations

To mitigate CVE-2025-33245, organizations should immediately upgrade the NVIDIA NeMo Framework to version 2.6.1 or later, where the vulnerability is patched. Beyond patching, implement strict input validation and sanitization to prevent processing of untrusted serialized data. Employ network segmentation and isolate AI development and deployment environments to limit exposure. Use application-level firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious deserialization attempts. Monitor logs and network traffic for anomalous activity related to NeMo processes. Enforce the principle of least privilege for users and services interacting with the framework to reduce the impact of potential exploitation. Conduct regular security assessments and penetration testing focused on AI infrastructure. Finally, educate developers and administrators about secure coding practices related to serialization and deserialization to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:08.194Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995c8836aea4a407a9d0cbe

Added to database: 2/18/2026, 2:11:15 PM

Last enriched: 2/27/2026, 8:17:09 AM

Last updated: 4/5/2026, 8:48:07 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses