NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

NVIDIA DGX Spark Vulnerabilities

An urgent security update for its DGX Spark AI workstation after discovering 14 vulnerabilities in the system’s firmware that could allow attackers to execute malicious code and launch denial-of-service attacks.

The most severe flaw has a CVSS score of 9.3 and affects all DGX Spark devices running versions before the new OTA0 update.

The vulnerabilities reside in multiple firmware components of the DGX Spark GB10, including SROOT, OSROOT, and hardware resource controls.

NVIDIA’s Offensive Security Research team identified these flaws, which expose the AI workstation to serious security risks.

Attackers with local access can exploit these weaknesses to bypass security protections, modify hardware controls, and gain unauthorized access to protected areas of the system-on-chip.

The critical vulnerability, tracked as CVE-2025-33187, allows attackers with privileged access to breach SoC-protected areas.

google

CVE ID Base Score CWE Potential Impacts
CVE-2025-33187 9.3 CWE-269 Code execution, information disclosure, data tampering, denial of service, escalation of privileges
CVE-2025-33188 8.0 CWE-269 Information disclosure, data tampering, denial of service
CVE-2025-33189 7.8 CWE-787 Code execution, data tampering, denial of service, information disclosure, escalation of privileges
CVE-2025-33190 6.7 CWE-787 Code execution, data tampering, denial of service, escalation of privileges
CVE-2025-33191 5.7 CWE-20 Denial of service
CVE-2025-33192 5.7 CWE-690 Code execution, denial of service, information disclosure
CVE-2025-33193 5.7 CWE-354 Code execution, denial of service, information disclosure
CVE-2025-33194 5.7 CWE-180 Information disclosure, denial of service
CVE-2025-33195 4.4 CWE-119 Data tampering, denial of service, escalation of privileges
CVE-2025-33196 4.4 CWE-226 Information disclosure
CVE-2025-33197 4.3 CWE-476 Code execution, denial of service
CVE-2025-33198 3.3 CWE-226 Information disclosure
CVE-2025-33199 3.2 CWE-670 Data tampering
CVE-2025-33200 2.3 CWE-226 Information disclosure

Potentially leading to code execution, data theft, system manipulation, denial-of-service attacks, or privilege escalation. This flaw requires immediate attention due to its critical severity rating and comprehensive impact on system integrity.

All NVIDIA DGX Spark systems running versions before OTA0 are vulnerable. The security update addresses all 14 CVEs simultaneously.

NVIDIA urges customers to download and install the latest DGX OS version immediately from the official NVIDIA DGX website.

Users can also visit the NVIDIA Product Security page to subscribe to security bulletins and report potential security issues. The vulnerabilities primarily require local access to exploit, though some can be triggered without privileges.

Organizations using DGX Spark workstations for AI development and machine learning workloads should prioritize this update to prevent potential compromise of sensitive AI models and training data.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link