Vulnerabilities

Security Vulnerability In NVIDIA Triton Could Let Attackers Trigger DoS Using Crafted Payloads

NVIDIA has issued a security bulletin warning about two high-severity vulnerabilities in its Triton Inference Server software.

These flaws allow remote attackers to cause denial-of-service conditions on Linux systems by injecting specially crafted inputs.​

Vulnerability Details

Attackers can exploit CVE-2025-33211 by improperly validating a specified quantity in inputs sent to the server.

This issue, linked to CWE-1284, enables denial-of-service without requiring privileges, as the CVSS v3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A: H yields a base score of 7.5.

The second flaw, CVE-2025-33201, stems from inadequate checks for unusual conditions when handling oversized payloads.

Classified under CWE-754, it shares the same CVSS vector and score, leading to server crashes that disrupt AI inference workloads.

Triton Inference Server is an open-source platform for deploying machine learning models across frameworks and hardware, including GPUs.

Both vulnerabilities require no authentication and can be triggered remotely, making them risky for production AI deployments where uptime matters.

Here’s a summary of the issues:

CVE IDDescriptionCVSS VectorBase ScoreSeverityCWEImpact
CVE-2025-33211Improper input quantity validationAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H7.5HighCWE-1284Denial of Service
CVE-2025-33201Poor handling of extra-large payloadsAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H7.5HighCWE-754Denial of Service

Mitigation Steps

Systems running Triton Inference Server on Linux before version r25.10 face exposure. NVIDIA patched both flaws in the r25.10 release available on GitHub.

Users must update immediately from the official releases page and follow the secure deployment guide, which covers API protections and logging safeguards.

Researchers credited include seaw1nd for CVE-2025-33211, and the Trend Micro Zero Day Initiative team and others for CVE-2025-33201.

No evidence shows active exploitation, but organizations handling AI models should scan networks and prioritize patches to avoid service disruptions.

NVIDIA urges monitoring its Product Security page for alerts.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago