CVE-2026-24153: CWE-501 Trust Boundary Violation in NVIDIA Jetson Xavier Series, Jetson Orin Series and Jetson Thor
CVE-2026-24153 is a medium severity vulnerability affecting NVIDIA Jetson Xavier, Orin, and Thor series running Jetson Linux prior to version 35. 6. 4. The issue arises from a trust boundary violation (CWE-501) where the nvluks trusted application within the initrd environment is not disabled as intended. Exploiting this flaw requires local privileges and no user interaction but remote access is limited due to the CVSS vector indicating physical or local attack vector. Successful exploitation can lead to high-impact information disclosure, compromising confidentiality without affecting integrity or availability. No known exploits are currently in the wild. This vulnerability primarily affects embedded AI and edge computing devices widely used in industrial, automotive, and robotics sectors. Mitigation requires updating to Jetson Linux 35. 6.
AI Analysis
Technical Summary
CVE-2026-24153 is a vulnerability identified in NVIDIA Jetson Linux affecting the Jetson Xavier, Orin, and Thor series platforms. The root cause is a trust boundary violation (CWE-501) within the initial RAM disk (initrd) environment, where the nvluks trusted application is not disabled as expected. The nvluks application is related to NVIDIA's Linux Unified Key Setup (LUKS) encryption management, and its improper enablement in initrd can expose sensitive cryptographic or system information. The vulnerability requires local privileges (CVSS vector AV:P, PR:L) to exploit but does not require user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. This suggests that an attacker with local access and some privileges could extract sensitive information, potentially cryptographic keys or other protected data, leading to information disclosure. The affected versions include all Jetson Linux versions prior to 35.6.4, and no patches are linked yet, indicating the need for vendor remediation. No known exploits have been reported in the wild, but the vulnerability poses a risk to embedded systems relying on these NVIDIA platforms, which are commonly used in AI edge computing, robotics, and automotive applications. The trust boundary violation highlights a failure in isolating trusted applications within the boot environment, which is critical for maintaining system security in embedded devices.
Potential Impact
The primary impact of CVE-2026-24153 is the potential disclosure of sensitive information on affected NVIDIA Jetson devices. Since these platforms are widely deployed in AI edge computing, robotics, autonomous vehicles, and industrial automation, unauthorized disclosure of cryptographic keys or system secrets could lead to further compromise, such as unauthorized access to encrypted data or manipulation of device behavior. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the device's security posture. Organizations relying on Jetson devices for critical operations may face risks including intellectual property theft, exposure of sensitive operational data, and increased attack surface for subsequent exploitation. The requirement for local privileges limits remote exploitation but insider threats or attackers gaining initial foothold could leverage this vulnerability. The medium severity rating reflects the balance between impact and exploitation complexity. However, given the strategic use of these devices in sectors like manufacturing, automotive, and defense, the real-world consequences could be significant if exploited.
Mitigation Recommendations
To mitigate CVE-2026-24153, organizations should: 1) Upgrade all affected NVIDIA Jetson devices to Jetson Linux version 35.6.4 or later once available, as this version disables the nvluks trusted application in initrd. 2) Review and harden the initrd configuration to ensure no unnecessary trusted applications are enabled, minimizing the attack surface. 3) Limit local access to Jetson devices by enforcing strict physical security controls and role-based access to prevent unauthorized privilege escalation. 4) Monitor device logs and system behavior for unusual access patterns that could indicate attempts to exploit this vulnerability. 5) Employ full disk encryption and secure boot mechanisms to reduce the risk of unauthorized modification or data extraction. 6) Coordinate with NVIDIA support or security advisories for any additional patches or mitigations. 7) Conduct regular security audits on embedded systems to identify and remediate similar trust boundary issues. These steps go beyond generic patching by emphasizing configuration review, access control, and monitoring tailored to embedded AI platforms.
Affected Countries
United States, Germany, Japan, South Korea, China, France, United Kingdom, Canada, India, Israel
CVE-2026-24153: CWE-501 Trust Boundary Violation in NVIDIA Jetson Xavier Series, Jetson Orin Series and Jetson Thor
Description
CVE-2026-24153 is a medium severity vulnerability affecting NVIDIA Jetson Xavier, Orin, and Thor series running Jetson Linux prior to version 35. 6. 4. The issue arises from a trust boundary violation (CWE-501) where the nvluks trusted application within the initrd environment is not disabled as intended. Exploiting this flaw requires local privileges and no user interaction but remote access is limited due to the CVSS vector indicating physical or local attack vector. Successful exploitation can lead to high-impact information disclosure, compromising confidentiality without affecting integrity or availability. No known exploits are currently in the wild. This vulnerability primarily affects embedded AI and edge computing devices widely used in industrial, automotive, and robotics sectors. Mitigation requires updating to Jetson Linux 35. 6.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-24153 is a vulnerability identified in NVIDIA Jetson Linux affecting the Jetson Xavier, Orin, and Thor series platforms. The root cause is a trust boundary violation (CWE-501) within the initial RAM disk (initrd) environment, where the nvluks trusted application is not disabled as expected. The nvluks application is related to NVIDIA's Linux Unified Key Setup (LUKS) encryption management, and its improper enablement in initrd can expose sensitive cryptographic or system information. The vulnerability requires local privileges (CVSS vector AV:P, PR:L) to exploit but does not require user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. This suggests that an attacker with local access and some privileges could extract sensitive information, potentially cryptographic keys or other protected data, leading to information disclosure. The affected versions include all Jetson Linux versions prior to 35.6.4, and no patches are linked yet, indicating the need for vendor remediation. No known exploits have been reported in the wild, but the vulnerability poses a risk to embedded systems relying on these NVIDIA platforms, which are commonly used in AI edge computing, robotics, and automotive applications. The trust boundary violation highlights a failure in isolating trusted applications within the boot environment, which is critical for maintaining system security in embedded devices.
Potential Impact
The primary impact of CVE-2026-24153 is the potential disclosure of sensitive information on affected NVIDIA Jetson devices. Since these platforms are widely deployed in AI edge computing, robotics, autonomous vehicles, and industrial automation, unauthorized disclosure of cryptographic keys or system secrets could lead to further compromise, such as unauthorized access to encrypted data or manipulation of device behavior. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the device's security posture. Organizations relying on Jetson devices for critical operations may face risks including intellectual property theft, exposure of sensitive operational data, and increased attack surface for subsequent exploitation. The requirement for local privileges limits remote exploitation but insider threats or attackers gaining initial foothold could leverage this vulnerability. The medium severity rating reflects the balance between impact and exploitation complexity. However, given the strategic use of these devices in sectors like manufacturing, automotive, and defense, the real-world consequences could be significant if exploited.
Mitigation Recommendations
To mitigate CVE-2026-24153, organizations should: 1) Upgrade all affected NVIDIA Jetson devices to Jetson Linux version 35.6.4 or later once available, as this version disables the nvluks trusted application in initrd. 2) Review and harden the initrd configuration to ensure no unnecessary trusted applications are enabled, minimizing the attack surface. 3) Limit local access to Jetson devices by enforcing strict physical security controls and role-based access to prevent unauthorized privilege escalation. 4) Monitor device logs and system behavior for unusual access patterns that could indicate attempts to exploit this vulnerability. 5) Employ full disk encryption and secure boot mechanisms to reduce the risk of unauthorized modification or data extraction. 6) Coordinate with NVIDIA support or security advisories for any additional patches or mitigations. 7) Conduct regular security audits on embedded systems to identify and remediate similar trust boundary issues. These steps go beyond generic patching by emphasizing configuration review, access control, and monitoring tailored to embedded AI platforms.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- nvidia
- Date Reserved
- 2026-01-21T19:09:29.850Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbf879e6bfc5ba1d28019b
Added to database: 3/31/2026, 4:38:17 PM
Last enriched: 3/31/2026, 4:54:45 PM
Last updated: 3/31/2026, 5:42:37 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.