CVE-2025-23335
Triton Inference Server Analyse et atténuation des vulnérabilités

Aperçu

NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability identified as CVE-2025-23335, discovered in August 2025. The vulnerability affects all versions prior to 25.05 of the Triton Inference Server. This security issue involves an underflow condition that can be triggered by a specific model configuration and input (NVIDIA Advisory).

Détails techniques

The vulnerability is classified as a CWE-191 (Integer Underflow) type issue. It has been assigned a CVSS v3.1 base score of 4.4 (Medium) with the vector string AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H, indicating that while the vulnerability is network accessible, it requires both high attack complexity and high privileges to exploit (NVIDIA Advisory, NVD).

Impact

A successful exploitation of this vulnerability can lead to denial of service conditions in the affected systems. The vulnerability specifically affects the Tensor RT backend of the Triton Inference Server, potentially disrupting service availability (NVIDIA Advisory).

Atténuation et solutions de contournement

NVIDIA has released version 25.05 of the Triton Inference Server to address this vulnerability. Users are advised to upgrade to this version or later. The fix is available for both Windows and Linux platforms. Users deploying NVIDIA Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide (NVIDIA Advisory).

Réactions de la communauté

Security researchers and organizations have acknowledged the vulnerability's disclosure, with ASEC including it in their security advisories. The medium severity rating and specific exploitation requirements have resulted in measured industry response (ASEC).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Triton Inference Server Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-23327CRITICAL9.1
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23335HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23334HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23333HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025
CVE-2025-23331HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NonOuiAug 06, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités