Cyber Posture

CVE-2025-23243

Medium

Published: 11 March 2025

Published
11 March 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
EPSS Score 0.0009 25.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23243 is a medium-severity Improper Access Control (CWE-284) vulnerability in Nvidia Riva. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations for access to system resources, addressing the improper access control vulnerability that enables data tampering or denial of service in NVIDIA Riva.

prevent

Monitors and controls communications at external interfaces, mitigating remote unauthenticated network access required to exploit the vulnerability.

prevent

Employs least privilege to restrict unauthorized actions by attackers exploiting the improper access control, limiting potential data tampering and DoS impacts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remotely exploitable improper access control vulnerability in the network-accessible NVIDIA Riva service, allowing unauthenticated attackers to cause data tampering or denial of service with no privileges or user interaction required, directly mapping to exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to data tampering or denial of service.

Deeper analysisAI

CVE-2025-23243 is an improper access control vulnerability (CWE-284) in NVIDIA Riva, published on 2025-03-11. The issue allows a user to potentially cause data tampering or denial of service upon successful exploitation. It has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L), rated as medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and unchanged scope.

An unauthenticated attacker with network access can exploit this vulnerability remotely. Exploitation requires low complexity and no user interaction, potentially leading to limited integrity impacts such as data tampering or limited availability impacts resulting in denial of service, with no confidentiality impacts.

The NVIDIA security advisory provides details on mitigation and patches at https://nvidia.custhelp.com/app/answers/detail/a_id/5625.

Details

CWE(s)

Affected Products

nvidia
riva
≤ 2.19.0

CVEs Like This One

CVE-2025-23242Same product: Linux Linux Kernel
CVE-2024-51954Same product: Linux Linux Kernel
CVE-2026-43055Same product: Linux Linux Kernel
CVE-2026-22984Same product: Linux Linux Kernel
CVE-2026-31649Same product: Linux Linux Kernel
CVE-2026-43037Same product: Linux Linux Kernel
CVE-2026-31668Same product: Linux Linux Kernel
CVE-2026-23427Same product: Linux Linux Kernel
CVE-2026-31718Same product: Linux Linux Kernel
CVE-2026-31612Same product: Linux Linux Kernel

References