CVE-2025-23317
Published: 06 August 2025
Summary
CVE-2025-23317 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Nvidia Triton Inference Server. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the heap-based buffer overflow by applying vendor patches to the NVIDIA Triton Inference Server HTTP component.
Information input validation on HTTP requests prevents specially crafted inputs from triggering the buffer overflow leading to reverse shell.
Boundary protection with firewalls or WAFs restricts network access to the vulnerable HTTP endpoint and filters malicious requests.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in public-facing HTTP server component allows unauthenticated network attackers to trigger RCE (via reverse shell) with no privileges or user interaction, directly mapping to exploitation of internet-facing applications.
NVD Description
NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. A successful exploit of this vulnerability might lead to remote code execution, denial of…
more
service, data tampering, or information disclosure.
Deeper analysisAI
CVE-2025-23317 is a vulnerability in the HTTP server component of NVIDIA Triton Inference Server. An attacker can initiate a reverse shell by sending a specially crafted HTTP request, which may lead to remote code execution, denial of service, data tampering, or information disclosure. The issue is classified under CWE-122 (Heap-based Buffer Overflow) and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating critical severity due to its high impact on integrity and availability.
This vulnerability can be exploited by any unauthenticated attacker with network access to the affected HTTP server endpoint. Exploitation requires low complexity and no user interaction or privileges, enabling remote attackers to potentially gain code execution capabilities via the reverse shell, disrupt service availability, modify data integrity, or extract sensitive information without altering the scope of impact.
Security practitioners should consult official advisories for mitigation guidance and patches, including NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5687, the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-23317, and the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-23317. The vulnerability was published on 2025-08-06.
Details
- CWE(s)