
Cloud Vulnerability DB
A community-led vulnerabilities database
NVIDIA Display Driver contains a vulnerability (CVE-2025-23309) where an uncontrolled DLL loading path might lead to arbitrary denial of service, escalation of privileges, code execution, and data tampering. The vulnerability was discovered by Daniel Rhea and disclosed on October 9, 2025 (NVIDIA Bulletin, NVD).
The vulnerability is classified as CWE-427 (Uncontrolled Search Path Element) with a CVSS v3.1 base score of 8.2 (High severity). The attack vector is Local (AV:L) with Low attack complexity (AC:L), requiring Low privileges (PR:L) and User interaction (UI:R). The scope is Changed (S:C) with High impact on Confidentiality, Integrity, and Availability (C:H/I:H/A:H) (NVIDIA Bulletin).
A successful exploitation of this vulnerability could lead to multiple severe consequences including denial of service, escalation of privileges, code execution, and data tampering in affected systems (NVIDIA Bulletin).
NVIDIA has released software security updates to address this vulnerability. For Windows systems, updates are available in driver branches R580, R570 (version 573.76), and R535 (version 539.56). Users are advised to download and install these updates through the NVIDIA Driver Downloads page. For systems using earlier branch releases, NVIDIA recommends upgrading to the latest branch release (NVIDIA Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."