Loading HuntDB...

CVE-2025-23266

CRITICAL
Published 2025-07-17T19:08:21.352Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-23266. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.0
/10
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.

Available Exploits

No exploits available for this CVE.

Related News

Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe threat to managed AI cloud services. The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 1…

Internet 2025-07-18 10:59

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.

Affected Products (ENISA)

nvidia
container toolkit

ENISA Scoring

CVSS Score (3.1)

9.0
/10
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.030
probability

Data provided by ENISA EU Vulnerability Database. Last updated: July 18, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-vmg3-7v43-9g23

Advisory Details

NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: July 17, 2025, Modified: July 17, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 3 days, 11 hours ago
systemtek-co-uk

NVIDIA Container Toolkit Environment Variable Handling Local Privilege Escalation Vulnerability (CVE-2025-23266)

Reddit 3 days, 22 hours ago
Saiyampathak
Exploit PoC

NVIDIAScape: How vNode prevents this container breakout without the need for VMs Did you here the news about the critical vulnerability NVIDIAScape? Wiz Research discovered the NVIDIAScape vulnerability (CVE-2025-23266), it exposed a container escape path via the NVIDIA Container Toolkit. The easy answer? Patch ASAP (upgrade NVIDIA Container Toolkit > …

2
2
6.0
View Original High Risk
Reddit 1 week, 1 day ago
digicat

NVIDIAScape - NVIDIA AI Vulnerability (CVE-2025-23266) - Escape in NVIDIA Container Toolkit

References

Published: 2025-07-17T19:08:21.352Z
Last Modified: 2025-07-17T20:35:09.951Z
Copied to clipboard!