Cyber Posture

CVE-2025-23242

High

Published: 11 March 2025

Published
11 March 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 20.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23242 is a high-severity Improper Access Control (CWE-284) vulnerability in Nvidia Riva. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved access authorizations to prevent improper access control bypasses leading to privilege escalation, data tampering, DoS, or information disclosure.

prevent

Remediates the specific improper access control flaw in NVIDIA Riva through identification, reporting, and patching as recommended in the vendor advisory.

prevent

Limits the scope and impact of privilege escalation resulting from the access control bypass by enforcing least privilege principles.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Network-accessible improper access control vulnerability with no auth required directly enables exploitation of public-facing applications (T1190) and can be used for privilege escalation (T1068) as explicitly described in the impacts.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, or information disclosure.

Deeper analysisAI

CVE-2025-23242 is an improper access control vulnerability (CWE-284) in NVIDIA Riva. The issue allows a user to bypass access controls, potentially leading to escalation of privileges, data tampering, denial of service, or information disclosure. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low attack complexity.

Attackers with network access to a vulnerable NVIDIA Riva instance can exploit this without requiring privileges or user interaction. Successful exploitation could enable privilege escalation on the system, arbitrary data tampering affecting integrity, denial of service impacting availability, or unauthorized disclosure of sensitive information.

NVIDIA has published a security advisory with mitigation guidance at https://nvidia.custhelp.com/app/answers/detail/a_id/5625. Security practitioners should consult this bulletin for details on patches, workarounds, or configuration changes to address the vulnerability.

Details

CWE(s)

Affected Products

nvidia
riva
≤ 2.19.0

CVEs Like This One

CVE-2025-23243Same product: Linux Linux Kernel
CVE-2026-31705Same product: Linux Linux Kernel
CVE-2026-31589Same product: Linux Linux Kernel
CVE-2026-43039Same product: Linux Linux Kernel
CVE-2026-23112Same product: Linux Linux Kernel
CVE-2026-31637Same product: Linux Linux Kernel
CVE-2026-24178Same product: Linux Linux Kernel
CVE-2025-33230Same product: Linux Linux Kernel
CVE-2026-31633Same product: Linux Linux Kernel
CVE-2026-31659Same product: Linux Linux Kernel

References