
PEACH
Un cadre d’isolation des locataires
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability (CVE-2025-23327) where an attacker could cause an integer overflow through specially crafted inputs. The vulnerability was discovered and disclosed on August 4, 2025, affecting all versions of the Triton Inference Server prior to version 25.05 (NVIDIA Advisory, NVD).
The vulnerability is classified as CWE-190 (Integer Overflow or Wraparound) with a CVSS v3.1 base score of 7.5 (High severity). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVIDIA Advisory).
A successful exploitation of this vulnerability could lead to denial of service and data tampering in affected systems. The high CVSS score indicates significant potential impact on system security and operations (NVIDIA Advisory).
NVIDIA has released version 25.05 of the Triton Inference Server to address this vulnerability. Users are strongly advised to update to this version or later. Additionally, NVIDIA recommends that users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users (NVIDIA Advisory).
Source: Ce rapport a été généré à l’aide de l’IA
Évaluation gratuite des vulnérabilités
Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.
Obtenez une démo personnalisée
"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."