Cyber Posture

CVE-2025-23311

Critical

Published: 06 August 2025

Published
06 August 2025
Modified
12 August 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0112 78.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23311 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Nvidia Triton Inference Server. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and timely remediation of the stack-based buffer overflow flaw in NVIDIA Triton Inference Server via patching.

prevent

Mandates validation of HTTP request inputs to block specially crafted requests that trigger the stack overflow vulnerability.

prevent

Implements memory protection mechanisms such as stack canaries, ASLR, and non-executable stacks to mitigate exploitation of the stack overflow for RCE or data tampering.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in public-facing Triton Inference Server triggered by crafted HTTP requests directly enables remote code execution via T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, or data tampering.

Deeper analysisAI

CVE-2025-23311 is a stack-based buffer overflow vulnerability (CWE-121) in NVIDIA Triton Inference Server. The flaw arises from specially crafted HTTP requests that can trigger the overflow, affecting the server's ability to process inference workloads securely. Published on August 6, 2025, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

Attackers require only network access to the affected Triton Inference Server instance, with no privileges, user interaction, or special conditions needed due to low attack complexity. Successful exploitation could enable remote code execution, denial of service, information disclosure, or data tampering, potentially compromising the host system running the server.

Mitigation guidance is available in the official NVIDIA security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5687, along with details in the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-23311 and the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-23311. Security practitioners should review these for patching instructions and workarounds.

Details

CWE(s)

Affected Products

nvidia
triton inference server
≤ 25.07

CVEs Like This One

CVE-2025-23310Same product: Linux Linux Kernel
CVE-2025-23318Same product: Linux Linux Kernel
CVE-2025-23317Same product: Linux Linux Kernel
CVE-2025-23319Same product: Linux Linux Kernel
CVE-2025-23316Same product: Linux Linux Kernel
CVE-2025-69273Same product: Linux Linux Kernel
CVE-2026-28710Same product: Linux Linux Kernel
CVE-2024-51954Same product: Linux Linux Kernel
CVE-2025-23243Same product: Linux Linux Kernel
CVE-2025-0502Same product: Linux Linux Kernel

References