
PEACH
Uma estrutura de isolamento de inquilino
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability (CVE-2025-23327) where an attacker could cause an integer overflow through specially crafted inputs. The vulnerability was discovered and disclosed on August 4, 2025, affecting all versions of the Triton Inference Server prior to version 25.05 (NVIDIA Advisory, NVD).
The vulnerability is classified as CWE-190 (Integer Overflow or Wraparound) with a CVSS v3.1 base score of 7.5 (High severity). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVIDIA Advisory).
A successful exploitation of this vulnerability could lead to denial of service and data tampering in affected systems. The high CVSS score indicates significant potential impact on system security and operations (NVIDIA Advisory).
NVIDIA has released version 25.05 of the Triton Inference Server to address this vulnerability. Users are strongly advised to update to this version or later. Additionally, NVIDIA recommends that users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users (NVIDIA Advisory).
Origem: Este relatório foi gerado usando IA
Avaliação de vulnerabilidade gratuita
Avalie suas práticas de segurança na nuvem em 9 domínios de segurança para comparar seu nível de risco e identificar lacunas em suas defesas.
Marque uma demonstração personalizada
"A melhor experiência do usuário que eu já vi, fornece visibilidade total para cargas de trabalho na nuvem."
"A Wiz fornece um único painel de vidro para ver o que está acontecendo em nossos ambientes de nuvem."
"Sabemos que se a Wiz identifica algo como crítico, na verdade é."