Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24141: CWE-502 Deserialization of Untrusted Data in NVIDIA NVIDIA Model Optimizer

0
High
VulnerabilityCVE-2026-24141cvecve-2026-24141cwe-502
Published: Tue Mar 24 2026 (03/24/2026, 20:26:51 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA Model Optimizer

Description

NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and information disclosure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 20:48:04 UTC

Technical Analysis

CVE-2026-24141 is a deserialization vulnerability classified under CWE-502 found in the NVIDIA Model Optimizer tool, which is used for optimizing AI models for deployment. Specifically, the vulnerability exists in the ONNX quantization feature where the software deserializes input files without sufficient validation or sanitization. An attacker who can supply a specially crafted input file can trigger unsafe deserialization, potentially leading to arbitrary code execution within the context of the user running the Model Optimizer. This can result in privilege escalation, unauthorized data modification, or information disclosure. The vulnerability affects all versions prior to 0.41.0 on both Windows and Linux platforms. The CVSS v3.1 score is 7.8 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability, combined with low attack complexity but requiring user interaction and local access. No patches or exploit code are currently publicly available, and no known exploits have been observed in the wild. The vulnerability highlights the risks of deserializing untrusted data in AI tooling environments, which are increasingly critical in enterprise and research settings.

Potential Impact

The potential impact of CVE-2026-24141 is substantial for organizations relying on NVIDIA Model Optimizer for AI model development and deployment. Successful exploitation could allow attackers to execute arbitrary code, leading to full system compromise or lateral movement within networks. Privilege escalation could enable attackers to gain administrative control, increasing the risk of persistent threats. Data tampering could corrupt AI models or training data, undermining model integrity and reliability, which is critical in sectors like healthcare, finance, and autonomous systems. Information disclosure could expose sensitive intellectual property or user data. Since the vulnerability requires local access and user interaction, insider threats or compromised endpoints are primary risk vectors. The lack of known exploits currently limits immediate widespread impact, but the high severity score and critical role of AI infrastructure make timely mitigation essential to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-24141, organizations should: 1) Upgrade NVIDIA Model Optimizer to version 0.41.0 or later as soon as the patch is released. 2) Restrict access to systems running Model Optimizer to trusted users only, minimizing the risk of malicious input files. 3) Implement strict input validation and sanitization for all files processed by the Model Optimizer, especially those related to ONNX quantization. 4) Employ application whitelisting and endpoint protection to detect and block suspicious activities resulting from exploitation attempts. 5) Monitor logs and system behavior for anomalies indicative of deserialization attacks or privilege escalation. 6) Educate users about the risks of opening untrusted files and enforce policies to prevent execution of unverified inputs. 7) Consider isolating AI model optimization environments within secure containers or virtual machines to limit the blast radius of potential exploits. 8) Maintain up-to-date backups of critical AI models and data to enable recovery in case of tampering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2026-01-21T19:09:27.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2f481f4197a8e3b7561ef

Added to database: 3/24/2026, 8:30:57 PM

Last enriched: 3/24/2026, 8:48:04 PM

Last updated: 3/26/2026, 5:30:32 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses