Cyber Posture

CVE-2025-23317

Critical

Published: 06 August 2025

Published
06 August 2025
Modified
12 August 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0333 87.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23317 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Nvidia Triton Inference Server. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the heap-based buffer overflow by applying vendor patches to the NVIDIA Triton Inference Server HTTP component.

prevent

Information input validation on HTTP requests prevents specially crafted inputs from triggering the buffer overflow leading to reverse shell.

prevent

Boundary protection with firewalls or WAFs restricts network access to the vulnerable HTTP endpoint and filters malicious requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Heap buffer overflow in public-facing HTTP server component allows unauthenticated network attackers to trigger RCE (via reverse shell) with no privileges or user interaction, directly mapping to exploitation of internet-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. A successful exploit of this vulnerability might lead to remote code execution, denial of…

more

service, data tampering, or information disclosure.

Deeper analysisAI

CVE-2025-23317 is a vulnerability in the HTTP server component of NVIDIA Triton Inference Server. An attacker can initiate a reverse shell by sending a specially crafted HTTP request, which may lead to remote code execution, denial of service, data tampering, or information disclosure. The issue is classified under CWE-122 (Heap-based Buffer Overflow) and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating critical severity due to its high impact on integrity and availability.

This vulnerability can be exploited by any unauthenticated attacker with network access to the affected HTTP server endpoint. Exploitation requires low complexity and no user interaction or privileges, enabling remote attackers to potentially gain code execution capabilities via the reverse shell, disrupt service availability, modify data integrity, or extract sensitive information without altering the scope of impact.

Security practitioners should consult official advisories for mitigation guidance and patches, including NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5687, the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-23317, and the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-23317. The vulnerability was published on 2025-08-06.

Details

CWE(s)

Affected Products

nvidia
triton inference server
≤ 25.07

CVEs Like This One

CVE-2025-23318Same product: Linux Linux Kernel
CVE-2025-23310Same product: Linux Linux Kernel
CVE-2025-23311Same product: Linux Linux Kernel
CVE-2025-23319Same product: Linux Linux Kernel
CVE-2025-23316Same product: Linux Linux Kernel
CVE-2025-69273Same product: Linux Linux Kernel
CVE-2026-28710Same product: Linux Linux Kernel
CVE-2024-51954Same product: Linux Linux Kernel
CVE-2025-60724Same vendor: Microsoft
CVE-2025-53766Same vendor: Microsoft

References