CVE-2025-23267
NVIDIA Container Toolkit vulnerability analysis and mitigation

Overview

NVIDIA Container Toolkit for all platforms contains a vulnerability (CVE-2025-23267) in the update-ldcache hook, discovered in July 2025. The vulnerability affects all versions up to and including 1.17.7 (CDI mode only for versions prior to 1.17.5) of the NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux versions up to and including 25.3.0. This security flaw has been assigned a CVSS v3.1 base score of 8.5 (High severity) (NVIDIA Security).

Technical details

The vulnerability exists in the update-ldcache hook of the NVIDIA Container Toolkit, where an attacker could exploit link following functionality through specially crafted container images. The vulnerability has been classified as CWE-59 (Improper Link Resolution Before File Access) and received a CVSS v3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H, indicating network accessibility with low attack complexity and requiring low privileges (NVIDIA Security, NVD Database).

Impact

A successful exploitation of this vulnerability can lead to data tampering and denial of service in affected systems. The high severity rating reflects the potential for significant system disruption, particularly in containerized environments running GPU-accelerated workloads, including high-performance computing (HPC) and AI/ML pipelines (Security Online).

Mitigation and workarounds

NVIDIA has released version 1.17.8 of the Container Toolkit and version 25.3.1 of the GPU Operator to address this vulnerability. Additionally, users can mitigate the issue by opting out of the enable-cuda-compat hook by editing the /etc/nvidia-container-toolkit/config.toml file to set the features.disable-cuda-compat-lib-hook feature flag to true. For GPU Operator users, mitigation can be implemented using specific Helm installation arguments (NVIDIA Security).

Community reactions

The vulnerability was discovered and reported by Lei Wang & Min Yao from the Nebula Security Lab at Huawei Cloud, demonstrating ongoing security research efforts in container security. The discovery has highlighted the growing risks in container orchestration and GPU-accelerated workloads, particularly in production environments (NVIDIA Security, Security Online).

Additional resources


SourceThis report was generated using AI

Related NVIDIA Container Toolkit vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-23266CRITICAL9
  • Alma LinuxAlma Linux
  • github.com/NVIDIA/gpu-operator
NoYesJul 17, 2025
CVE-2025-23267HIGH8.5
  • NVIDIA Container ToolkitNVIDIA Container Toolkit
  • github.com/NVIDIA/mig-parted
NoYesJul 17, 2025
CVE-2025-22874HIGH7.5
  • DockerDocker
  • volume-modifier-for-k8s-fips
NoYesJun 11, 2025
CVE-2025-47907HIGH7
  • DockerDocker
  • elvish
NoYesAug 07, 2025
CVE-2025-4673MEDIUM6.8
  • DockerDocker
  • podman-remote
NoYesJun 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management