Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS

Attackers could crash analysis tools or leak memory contents by distributing weaponized cubin files – a critical risk for AI development teams sharing pre-trained models. These vulnerabilities, spanning the cuobjdump and nvdisasm utilities, expose developers to denial-of-service (DoS) attacks and information disclosure risks when analyzing maliciously crafted cubin files. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. As CUDA dominates AI/ML development, hardening binary analysis tools becomes imperative to prevent cascading failures in GPU-dependent infrastructures. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Researchers uncovered nine critical vulnerabilities in NVIDIA’s CUDA Toolkit, a cornerstone software suite for GPU-accelerated computing. With NVIDIA GPUs powering everything from AI research to scientific simulations, these flaws highlight systemic security challenges in foundational GPU development tools. The era of trusting GPU binaries as inert data files has ended – these vulnerabilities prove that even development utilities require memory-safe coding practices. Organizations should audit legacy CUDA projects and implement runtime monitoring for cubin analysis workflows. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. CUDA binaries (.cubin) use the standardized ELF (Executable and Linkable Format) to encapsulate GPU-specific instructions alongside CPU-executable code. NVIDIA’s February 2025 security update patches all nine CVEs.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 20 Feb 2025 10:25:14 +0000


Cyber News related to Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS

Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS - Attackers could crash analysis tools or leak memory contents by distributing weaponized cubin files – a critical risk for AI development teams sharing pre-trained models. These vulnerabilities, spanning the cuobjdump and nvdisasm utilities, expose ...
9 months ago Cybersecuritynews.com
NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data - Organizations using NVIDIA Container Toolkit or Docker on Linux are at risk, especially those running AI workloads like machine learning for healthcare, finance, or autonomous systems. A critical vulnerability in NVIDIA’s Container Toolkit, ...
7 months ago Cybersecuritynews.com CVE-2024-0132
PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability - Organizations utilizing managed AI services from major cloud providers face immediate exposure, as a single malicious container could compromise entire host systems and access sensitive data belonging to multiple tenants. The vulnerability affects ...
4 months ago Cybersecuritynews.com
Nvidia sued after video call mistake showed 'stolen' data - According to a lawsuit filed against tech giant Nvidia, senior staff member Mohammad Moniruzzaman made this error with disastrous consequences. In the course of it, Valeo claims he accidentally displayed a file proving he stole its tech secrets. The ...
2 years ago Bbc.com
Cohesity partners with NVIDIA to harness the power of generative AI - Cohesity announced a collaboration with NVIDIA to help organizations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. ...
1 year ago Helpnetsecurity.com
SVG Security Analysis Toolkit: Enhancing Cyber Defense with Advanced Tools - The SVG Security Analysis Toolkit is a comprehensive suite designed to enhance cybersecurity defenses by analyzing and mitigating threats embedded within SVG files. As SVG files are widely used for vector graphics on the web, they have become a ...
2 months ago Cybersecuritynews.com
Palo Alto Networks Prevents Data Loss at Enterprise Scale with NVIDIA - With NVIDIA accelerated computing and AI software, cybersecurity leaders like Palo Alto Networks can safeguard vast amounts of sensitive information with unprecedented speed and accuracy, ushering in a new era of AI-driven data protection. The ...
1 year ago Paloaltonetworks.com
Whisper Leak Toolkit: A New Threat in Cybersecurity Landscape - The Whisper Leak Toolkit has emerged as a significant threat in the cybersecurity landscape, offering attackers a powerful means to exploit vulnerabilities and leak sensitive information. This toolkit is designed to facilitate data breaches by ...
3 weeks ago Cybersecuritynews.com
NVIDIA Container Toolkit Vulnerability Let Attackers Execute Code - Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Researchers from Wiz Research noted that CVE-2025-23359 bypasses an earlier vulnerability, CVE-2024-0132, which was patched in ...
9 months ago Cybersecuritynews.com CVE-2025-23359 CVE-2024-0132
NVIDIA Riva Vulnerabilities Let Attackers Escalate Privileges - The update, detailed in a March 10, 2025 security bulletin, impacts all Linux deployments running Riva versions ≤2.18.0 and follows coordinated disclosure with  Trend Micro’s David Fiser and Alfredo Oliveira researchers. NVIDIA has ...
8 months ago Cybersecuritynews.com CVE-2025-23242
Vulnerability Recap 10/01/24: NVIDIA, Ivanti, Kia - “The vulnerability stems from inadequate validation of network data, allowing attackers to get the vulnerable system to install a malicious printer driver, and then send a print job to that driver triggering execution of the malicious code,” said ...
1 year ago Esecurityplanet.com CVE-2024-6769
CISA Updates Toolkit with Nine New Resources to Promote Public Safety Communications and Cyber Resiliency - The Cybersecurity and Infrastructure Security Agency collaborates with public safety, national security, and emergency preparedness communities to enhance seamless and secure communications to keep America safe, secure, and resilient. Any ...
1 year ago Cisa.gov
Nvidia To Build Network Of AI Chip Plants In Japan - Nvidia chief Jensen Huang says company to work with local companies to build network of AI chip plants in Japan. Nvidia is to collaborate with local companies to build a network of semiconductor manufacturing facilities in Japan to meet demand for ...
1 year ago Silicon.co.uk
CVE-2008-5144 - nvidia-cg-toolkit-installer in nvidia-cg-toolkit 2.0.0015 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvidia-cg-toolkit-manifest temporary file. ...
16 years ago
HikvisionExploiter – Exploitation Toolkit for Hikvision DVRs and NVRs - The HikvisionExploiter is a specialized exploitation toolkit targeting Hikvision DVRs and NVRs, widely used in surveillance systems globally. This toolkit enables attackers to exploit vulnerabilities in Hikvision devices, allowing unauthorized access ...
1 month ago Cybersecuritynews.com CVE-2021-36260 CVE-2021-36259
Nvidia Targets Insider Threats with Digital Fingerprinting Technology - Nvidia recently announced a new technology to help detect and prevent insider threats. The tech, known as Digital Fingerprinting, is designed to detect unauthorized attempts to access sensitive data or systems within a company's network. The ...
2 years ago Csoonline.com
GPUHammer - First Rowhammer Attack Targeting NVIDIA GPUs - Cybersecurity researchers at the University of Toronto have achieved a breakthrough in hardware-level attacks by successfully demonstrating GPUHammer, the first Rowhammer attack specifically targeting discrete NVIDIA GPUs. The research, which focuses ...
4 months ago Cybersecuritynews.com Inception
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
1 year ago Securityaffairs.com
Warfare and Geopolitics are Fuelling Denial-of-Service Attacks - The analysis is based on 310 verified Denial-of-Service incidents during the reporting period of January 2022 to August 2023. A large-scale study is also included of publicly reported incidents. The study focuses on the motivations of attackers, ...
1 year ago Enisa.europa.eu
Building Data Center Infrastructure for the AI Revolution  - This is part two of a multi-part blog series on AI. Part one, Why 2024 is the Year of AI for Networking, discussed Cisco's AI networking vision and strategy. This blog will focus on evolving data center network infrastructure for supporting AI/ML ...
1 year ago Feedpress.me
Nvidia Promises Japan AI Support Amidst Heavy Demand - Nvidia chief executive Jensen Huang says company will try to prioritise Japan AI requirements amidst heavy worldwide demand. Nvidia chief executive Jensen Huang said the company would do its best to prioritise Japan for artificial intelligence chips ...
1 year ago Silicon.co.uk
NVIDIA issues guidance to defend GDDR6 GPUs against Rowhammer - NVIDIA is warning users to activate the System Level Error-Correcting Code  mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory. Rowhammer represents a real security concern that could cause ...
4 months ago Bleepingcomputer.com
‘SessionShark' - New Toolkit That Evades Microsoft Office 365 MFA - The toolkit implements specialized “human verification techniques” to filter out automated security scanners and research bots, ensuring the phishing content remains hidden from security systems. A sophisticated new phishing toolkit named ...
7 months ago Cybersecuritynews.com
Zig Strike - An Offensive Toolkit to Create Payloads and Bypass AV, XDR/EDR Detections - Zig Strike is a sophisticated offensive toolkit designed to bypass advanced security solutions, including Anti-Virus (AV), Next-Generation Antivirus (NGAV), and Endpoint Detection and Response (XDR/EDR) systems. KPMG said that the toolkit also ...
5 months ago Cybersecuritynews.com
NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code - A successful exploit of this vulnerability might lead to code execution and data tampering,” states the official security bulletin. “NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted ...
7 months ago Cybersecuritynews.com