Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24154: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA Jetson Xavier Series, Jetson Orin Series and Jetson Thor

0
High
VulnerabilityCVE-2026-24154cvecve-2026-24154cwe-78
Published: Tue Mar 31 2026 (03/31/2026, 16:23:34 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Jetson Xavier Series, Jetson Orin Series and Jetson Thor

Description

CVE-2026-24154 is a high-severity OS command injection vulnerability affecting NVIDIA Jetson Xavier, Orin, and Thor series devices running Jetson Linux versions prior to 35. 6. 4. The flaw exists in the initrd process, allowing an unprivileged attacker with physical access to inject malicious command line arguments. Exploitation can lead to full code execution, privilege escalation, denial of service, data tampering, and information disclosure without requiring user interaction or prior authentication. The vulnerability stems from improper neutralization of special elements in OS commands (CWE-78). Although no known exploits are currently in the wild, the impact scope is critical due to the affected devices' use in edge AI and embedded systems. Organizations relying on these NVIDIA Jetson platforms should prioritize patching once updates are available and restrict physical access to vulnerable devices to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:53:53 UTC

Technical Analysis

CVE-2026-24154 is an OS command injection vulnerability identified in the initrd component of NVIDIA Jetson Linux, specifically impacting the Jetson Xavier, Orin, and Thor series. The vulnerability arises from improper neutralization of special characters in command line arguments processed during the early boot phase (initrd), which can be manipulated by an attacker with physical access to the device. Because the attacker does not require any privileges or user interaction, they can inject malicious commands that the system executes with elevated privileges. This can result in arbitrary code execution, allowing the attacker to escalate privileges, disrupt system availability through denial of service, tamper with data, or disclose sensitive information. The vulnerability affects all versions prior to 35.6.4 of Jetson Linux. The CVSS v3.1 score of 7.6 reflects the high severity, with attack vector being physical, low attack complexity, no privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability at a high level. While no public exploits are known yet, the critical nature of the affected devices, which are widely used in AI edge computing, robotics, and embedded applications, makes this a significant threat. The lack of patch links suggests that a fix may be forthcoming or in development, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The potential impact of CVE-2026-24154 is substantial for organizations deploying NVIDIA Jetson Xavier, Orin, and Thor devices, especially in environments where physical security cannot be guaranteed. Successful exploitation can lead to full system compromise, enabling attackers to execute arbitrary code with elevated privileges, potentially taking control of the device. This can disrupt critical AI workloads, cause denial of service, corrupt or tamper with sensitive data, and leak confidential information. Given the Jetson platform's role in edge AI, robotics, autonomous systems, and industrial IoT, such compromises could have cascading effects on operational technology, safety-critical systems, and data integrity. The physical access requirement limits remote exploitation but does not eliminate risk in scenarios like shared facilities, supply chain attacks, or insider threats. The vulnerability's broad impact on confidentiality, integrity, and availability underscores the need for urgent remediation to prevent potential espionage, sabotage, or operational disruption.

Mitigation Recommendations

To mitigate CVE-2026-24154, organizations should implement the following specific measures: 1) Restrict physical access to all NVIDIA Jetson devices by enforcing strict access controls, surveillance, and secure enclosures to prevent unauthorized manipulation of boot parameters. 2) Monitor and audit device boot processes and logs for unusual command line arguments or boot-time anomalies that could indicate exploitation attempts. 3) Once NVIDIA releases a patch or updated Jetson Linux version (35.6.4 or later), prioritize immediate deployment across all affected devices. 4) Employ hardware security modules or trusted platform modules (TPMs) where possible to validate boot integrity and prevent unauthorized boot parameter modifications. 5) For environments where physical access cannot be fully controlled, consider additional network segmentation and endpoint detection to limit the impact of compromised devices. 6) Educate personnel about the risks of physical tampering and establish incident response procedures for suspected device compromise. These targeted actions go beyond generic advice by focusing on the unique physical access vector and boot-time injection nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2026-01-21T19:09:29.850Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbf879e6bfc5ba1d2801a0

Added to database: 3/31/2026, 4:38:17 PM

Last enriched: 3/31/2026, 4:53:53 PM

Last updated: 3/31/2026, 5:46:17 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses