
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability (CVE-2025-23327) where an attacker could cause an integer overflow through specially crafted inputs. The vulnerability was discovered and disclosed on August 4, 2025, affecting all versions of the Triton Inference Server prior to version 25.05 (NVIDIA Advisory, NVD).
The vulnerability is classified as CWE-190 (Integer Overflow or Wraparound) with a CVSS v3.1 base score of 7.5 (High severity). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVIDIA Advisory).
A successful exploitation of this vulnerability could lead to denial of service and data tampering in affected systems. The high CVSS score indicates significant potential impact on system security and operations (NVIDIA Advisory).
NVIDIA has released version 25.05 of the Triton Inference Server to address this vulnerability. Users are strongly advised to update to this version or later. Additionally, NVIDIA recommends that users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users (NVIDIA Advisory).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"