NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments

This creates a false sense of security, as attackers can still abuse services or pivot to internal systems through poorly isolated Triton Inference Server instances. Trend Micro researchers uncovered two vulnerabilities-CVE-2025-23242 and CVE-2025-23243-stemming from misconfigured deployments that expose Riva’s gRPC and Triton Inference Server endpoints to the public internet. Attackers exploiting these flaws could access sensitive APIs without credentials, leveraging exposed ports (50051 for gRPC, 8000–8002 for Triton) to execute arbitrary inference requests. Trend Micro identified memory corruption risks in unpatched Triton versions, where malformed inference requests could trigger buffer overflows-a vector for remote code execution. Trend Micro analysts noted that the root cause lies in Riva’s default container configurations, which bind services to all network interfaces (0.0.0.0) without enforcing client authentication. A critical security flaw in NVIDIA’s Riva framework, an AI-powered speech and translation service, has left cloud environments vulnerable to unauthorized access and exploitation. “Even when organizations enable SSL/TLS for encrypted communications, the absence of mutual authentication allows anyone to connect to secured endpoints,” explained Alfredo Oliveira, a lead researcher at Trend Micro’s Zero Day Initiative. Administrators must also reconfigure security groups to restrict ingress traffic to trusted IPs and enforce role-based access controls (RBAC) on Triton endpoints. This is exacerbated by Riva containers running with elevated privileges, allowing successful attackers to escalate access to underlying Kubernetes clusters or cloud instances. Compounding the risk, Riva’s internal Triton Inference Server endpoints remain exposed through ports 8000–8002. Attackers can directly interact with Triton’s HTTP/REST and gRPC APIs to execute inference requests or probe for model vulnerabilities. These flaws enable threat actors to bypass authentication, abuse GPU resources, and potentially steal proprietary AI models or disrupt services through denial-of-service (DoS) attacks. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerabilities predominantly affect Linux-based deployments running Riva versions up to 2.18.0, which lack proper SSL/TLS configuration and network isolation. However, Trend Micro’s analysis revealed that even secured configurations fail to validate client certificates, allowing unauthenticated access. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. This oversight enables attackers to bypass payment systems tied to API keys and abuse GPU resources for cryptomining or adversarial model training.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 29 Apr 2025 14:50:11 +0000


Cyber News related to NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments

NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments - This creates a false sense of security, as attackers can still abuse services or pivot to internal systems through poorly isolated Triton Inference Server instances. Trend Micro researchers uncovered two vulnerabilities-CVE-2025-23242 and ...
1 month ago Cybersecuritynews.com CVE-2025-23242
NVIDIA Riva Vulnerabilities Let Attackers Escalate Privileges - The update, detailed in a March 10, 2025 security bulletin, impacts all Linux deployments running Riva versions ≤2.18.0 and follows coordinated disclosure with  Trend Micro’s David Fiser and Alfredo Oliveira researchers. NVIDIA has ...
3 months ago Cybersecuritynews.com CVE-2025-23242
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
1 year ago Techtarget.com
25 Best Cloud Service Providers (Public and Private) in 2025 - Oracle Cloud offers a variety of services, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), to help organizations build, deploy, and run applications in the cloud. Oracle Cloud is a cloud ...
1 month ago Cybersecuritynews.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
1 year ago Techtarget.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
1 year ago Cybersecurity-insiders.com
The Invisible Storm: Why Cloud Malware Is Your Business's New WeatherEmergency - Protecting your business from cloud malware requires a fundamental shift in security thinking, as traditional defenses simply weren’t designed for these sophisticated airborne threats. Recent research by Cloud Storage Security identified ...
1 month ago Cybersecuritynews.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
1 year ago Techtarget.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
2 years ago Blog.isc2.org
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
1 year ago Feeds.dzone.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
1 year ago Esecurityplanet.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
1 year ago Crowdstrike.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
1 year ago Feeds.dzone.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
1 year ago Techtarget.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
2 months ago Cybersecuritynews.com
Cloud Security Posture Management - The CISO’s Essential Guide - By integrating CSPM into the broader security strategy and fostering a security-first culture throughout the organization, CISOs can build truly resilient cloud environments that support business objectives while protecting critical assets. ...
2 months ago Cybersecuritynews.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
11 months ago Esecurityplanet.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
1 year ago Feeds.dzone.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
1 year ago Techtarget.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
1 year ago Securityzap.com
Security Company Skyhawk Launches Platform for Multi-Cloud Threat Detection & Response - Skyhawk, a security company specializing in cloud security solutions, recently launched a cloud-native platform to provide threat detection and response across multi-cloud environments. The Skyhawk platform works with cloud service providers like ...
2 years ago Csoonline.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
11 months ago Crowdstrike.com
5 Best Practices for Securing Azure Resources - Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their ...
1 year ago Crowdstrike.com