CVE-2025-23334
Triton Inference Server Analyse et atténuation des vulnérabilités

Aperçu

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability (CVE-2025-23334) in the Python backend, discovered in August 2025. The vulnerability allows an attacker to cause an out-of-bounds read by sending a request to the server. The issue affects all versions of NVIDIA Triton Inference Server prior to version 25.07 (NVIDIA Bulletin, NVD).

Détails techniques

The vulnerability is classified as CWE-125 (Out-of-bounds Read) with a CVSS v3.1 base score of 5.9 (Medium) and vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. The flaw exists in the Python backend component of the Triton Inference Server, where improper validation of requests can trigger an out-of-bounds read condition (NVIDIA Bulletin).

Impact

A successful exploitation of this vulnerability could lead to information disclosure from the affected system. The vulnerability allows attackers to read data outside the intended boundaries, potentially exposing sensitive information processed by the Triton Inference Server (NVIDIA Bulletin, Wiz Blog).

Atténuation et solutions de contournement

NVIDIA has released version 25.07 of the Triton Inference Server to address this vulnerability. Users are strongly advised to upgrade both the NVIDIA Triton Inference Server and the Python backend to this version. Additionally, users deploying the server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users (NVIDIA Bulletin).

Réactions de la communauté

The vulnerability was discovered as part of a broader security research effort by the Wiz Research team, who have previously disclosed other NVIDIA vulnerabilities. The discovery highlights the importance of securing AI infrastructure components, particularly as organizations increasingly deploy AI and ML solutions (Wiz Blog).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Triton Inference Server Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-23327CRITICAL9.1
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23335HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23334HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23333HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23331HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités