NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation

NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation

NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow attackers to execute malicious code and escalate privileges on affected systems. 

The vulnerability, designated CVE-2025-23307, affects all versions of NVIDIA NeMo Curator prior to release 25.07 across Windows, Linux, and macOS platforms.

The security flaw stems from improper input validation in the NeMo Curator’s file processing mechanisms, enabling threat actors to craft malicious files that trigger code injection attacks. 

Google News

Key Takeaways
1. CVE-2025-23307 in NeMo Curator enables local code execution and privilege escalation.
2. Improper input validation impacts confidentiality, integrity, and availability.
3. Upgrade and tighten access controls.

With a CVSS v3.1 base score of 7.8, this vulnerability is classified as high severity and poses significant risks to enterprise AI infrastructure deployments.

Code Injection Vulnerability

The vulnerability is categorized under CWE-94 (Code Injection), indicating that the NeMo Curator fails to properly sanitize user-supplied input when processing certain file types. 

The attack vector requires local access (AV:L) with low attack complexity (AC:L) and low privileges (PR:L), making it relatively accessible to attackers who have gained initial system access.

The CVSS vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H reveals that successful exploitation requires no user interaction (UI:N) and can result in high impact to confidentiality, integrity, and availability. 

Attackers can potentially achieve complete system compromise through code execution, privilege escalation, information disclosure, and data tampering capabilities.

The company emphasizes that local access requirements may limit the vulnerability’s immediate exploitability in properly segmented environments.

The vulnerability was responsibly disclosed to NVIDIA by security researcher D.K., highlighting the importance of collaborative security research in identifying and addressing AI platform vulnerabilities. 

Risk Factors Details
Affected Products NVIDIA NeMo Curator (all versions < 25.07)
Impact Code execution; privilege escalation
Exploit Prerequisites Local access; low attack complexity; low privileges
CVSS 3.1 Score 7.8 (High)

Mitigations

NVIDIA has released Curator version 25.07 to address this security vulnerability, with updates available through the official NVIDIA GitHub repository. 

Organizations using earlier branch releases are advised to upgrade to the latest available version within their deployment branch, as all historical versions remain affected by this vulnerability.

The security update implements enhanced input validation mechanisms and file processing safeguards to prevent malicious code injection attacks. 

System administrators should prioritize this update, particularly in environments where NeMo Curator processes untrusted or external data sources.

NVIDIA recommends conducting thorough testing of the updated version in staging environments before production deployment to ensure compatibility with existing AI workflows and model training pipelines. 

Organizations should also review their access control policies to minimize potential attack surfaces, given the vulnerability’s local access requirements.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.