PT-2025-31845 · Nvidia · Nvidia Triton Inference Server
Published
2025-08-04
·
Updated
2025-08-06
·
CVE-2025-23319
CVSS v3.1
8.1
8.1
High
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
### Name of the Vulnerable Software and Affected Versions:
NVIDIA Triton Inference Server versions prior to 25.07
### Description:
A vulnerability chain in NVIDIA Triton Inference Server allows remote, unauthenticated attackers to gain full Remote Code Execution (RCE) and potentially take control of the server. The vulnerability involves flaws starting with an information leak within the Python backend. Exploitation can lead to denial-of-service (DoS) or data theft via crafted requests. The server is a cornerstone of many AI/ML production environments.
### Recommendations:
Upgrade to version 25.07 or higher.
Fix
RCE
Weakness Enumeration
Related Identifiers
CVE-2025-23319
Affected Products
Nvidia Triton Inference Server
References · 20
- https://nvd.nist.gov/vuln/detail/CVE-2025-23319 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-23319 · Security Note
- https://nvidia.custhelp.com/app/answers/detail/a_id/5687 · Note
- https://twitter.com/zoomeye_team/status/1952669205779595501 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1mhj0rf/critical_nvidia_triton_bugs_risk_ai_server · Reddit Post
- https://twitter.com/samilaiho/status/1952704175881572358 · Twitter Post
- https://twitter.com/securityRSS/status/1952769788914131017 · Twitter Post
- https://twitter.com/HunterMapping/status/1953001034499903682 · Twitter Post
- https://t.me/S_E_Reborn/5807 · Telegram Post
- https://twitter.com/ronenshh/status/1952367271533302125 · Twitter Post
- https://twitter.com/Andrewkek77/status/1952662782224003260 · Twitter Post
- https://twitter.com/catnap707/status/1952484094354563483 · Twitter Post
- https://twitter.com/Andrewkek77/status/1952662784610595140 · Twitter Post
- https://twitter.com/jbhall56/status/1952715490331165169 · Twitter Post
- https://twitter.com/zoomeye_team/status/1952672739686535269 · Twitter Post