Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24153: CWE-501 Trust Boundary Violation in NVIDIA Jetson Xavier Series, Jetson Orin Series and Jetson Thor

0
Medium
VulnerabilityCVE-2026-24153cvecve-2026-24153cwe-501
Published: Tue Mar 31 2026 (03/31/2026, 16:23:14 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Jetson Xavier Series, Jetson Orin Series and Jetson Thor

Description

CVE-2026-24153 is a medium severity vulnerability affecting NVIDIA Jetson Xavier, Orin, and Thor series running Jetson Linux prior to version 35. 6. 4. The issue arises from a trust boundary violation (CWE-501) where the nvluks trusted application within the initrd environment is not disabled as intended. Exploiting this flaw requires local privileges and no user interaction but remote access is limited due to the CVSS vector indicating physical or local attack vector. Successful exploitation can lead to high-impact information disclosure, compromising confidentiality without affecting integrity or availability. No known exploits are currently in the wild. This vulnerability primarily affects embedded AI and edge computing devices widely used in industrial, automotive, and robotics sectors. Mitigation requires updating to Jetson Linux 35. 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:54:45 UTC

Technical Analysis

CVE-2026-24153 is a vulnerability identified in NVIDIA Jetson Linux affecting the Jetson Xavier, Orin, and Thor series platforms. The root cause is a trust boundary violation (CWE-501) within the initial RAM disk (initrd) environment, where the nvluks trusted application is not disabled as expected. The nvluks application is related to NVIDIA's Linux Unified Key Setup (LUKS) encryption management, and its improper enablement in initrd can expose sensitive cryptographic or system information. The vulnerability requires local privileges (CVSS vector AV:P, PR:L) to exploit but does not require user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. This suggests that an attacker with local access and some privileges could extract sensitive information, potentially cryptographic keys or other protected data, leading to information disclosure. The affected versions include all Jetson Linux versions prior to 35.6.4, and no patches are linked yet, indicating the need for vendor remediation. No known exploits have been reported in the wild, but the vulnerability poses a risk to embedded systems relying on these NVIDIA platforms, which are commonly used in AI edge computing, robotics, and automotive applications. The trust boundary violation highlights a failure in isolating trusted applications within the boot environment, which is critical for maintaining system security in embedded devices.

Potential Impact

The primary impact of CVE-2026-24153 is the potential disclosure of sensitive information on affected NVIDIA Jetson devices. Since these platforms are widely deployed in AI edge computing, robotics, autonomous vehicles, and industrial automation, unauthorized disclosure of cryptographic keys or system secrets could lead to further compromise, such as unauthorized access to encrypted data or manipulation of device behavior. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the device's security posture. Organizations relying on Jetson devices for critical operations may face risks including intellectual property theft, exposure of sensitive operational data, and increased attack surface for subsequent exploitation. The requirement for local privileges limits remote exploitation but insider threats or attackers gaining initial foothold could leverage this vulnerability. The medium severity rating reflects the balance between impact and exploitation complexity. However, given the strategic use of these devices in sectors like manufacturing, automotive, and defense, the real-world consequences could be significant if exploited.

Mitigation Recommendations

To mitigate CVE-2026-24153, organizations should: 1) Upgrade all affected NVIDIA Jetson devices to Jetson Linux version 35.6.4 or later once available, as this version disables the nvluks trusted application in initrd. 2) Review and harden the initrd configuration to ensure no unnecessary trusted applications are enabled, minimizing the attack surface. 3) Limit local access to Jetson devices by enforcing strict physical security controls and role-based access to prevent unauthorized privilege escalation. 4) Monitor device logs and system behavior for unusual access patterns that could indicate attempts to exploit this vulnerability. 5) Employ full disk encryption and secure boot mechanisms to reduce the risk of unauthorized modification or data extraction. 6) Coordinate with NVIDIA support or security advisories for any additional patches or mitigations. 7) Conduct regular security audits on embedded systems to identify and remediate similar trust boundary issues. These steps go beyond generic patching by emphasizing configuration review, access control, and monitoring tailored to embedded AI platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2026-01-21T19:09:29.850Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbf879e6bfc5ba1d28019b

Added to database: 3/31/2026, 4:38:17 PM

Last enriched: 3/31/2026, 4:54:45 PM

Last updated: 3/31/2026, 5:42:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses