
PEACH
Un framework di isolamento del tenant
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability (CVE-2025-23327) where an attacker could cause an integer overflow through specially crafted inputs. The vulnerability was discovered and disclosed on August 4, 2025, affecting all versions of the Triton Inference Server prior to version 25.05 (NVIDIA Advisory, NVD).
The vulnerability is classified as CWE-190 (Integer Overflow or Wraparound) with a CVSS v3.1 base score of 7.5 (High severity). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVIDIA Advisory).
A successful exploitation of this vulnerability could lead to denial of service and data tampering in affected systems. The high CVSS score indicates significant potential impact on system security and operations (NVIDIA Advisory).
NVIDIA has released version 25.05 of the Triton Inference Server to address this vulnerability. Users are strongly advised to update to this version or later. Additionally, NVIDIA recommends that users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users (NVIDIA Advisory).
Fonte: Questo report è stato generato utilizzando l'intelligenza artificiale
Valutazione gratuita delle vulnerabilità
Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.
Richiedi una demo personalizzata
"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."