CVE-2026-24175
Published: 07 April 2026
Summary
CVE-2026-24175 is a high-severity Uncaught Exception (CWE-248) vulnerability in Nvidia Triton Inference Server. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires the system to handle errors and exceptions from malformed request headers gracefully without crashing or causing denial of service.
Mandates validation of information inputs such as HTTP request headers to detect and reject malformed ones before processing, preventing uncaught exceptions.
Implements denial-of-service protection to counter crash-inducing malformed requests targeting the Triton Inference Server.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Malformed request triggers uncaught exception crash, directly enabling application exploitation for endpoint DoS.
NVD Description
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service.
Deeper analysisAI
CVE-2026-24175 is a vulnerability in NVIDIA Triton Inference Server that allows an attacker to cause a server crash by sending a malformed request header. This issue, published on 2026-04-07, is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-248 (Uncaught Exception). The flaw affects the server's ability to handle certain HTTP requests properly, leading to denial of service.
A remote attacker with network access to the Triton Inference Server can exploit this vulnerability without authentication privileges or user interaction. The attack requires low complexity, involving the transmission of a specially crafted malformed request header, which triggers an uncaught exception and crashes the server process. Successful exploitation results in a denial of service, disrupting inference services until the server is restarted.
Mitigation details and patches are outlined in official advisories, including NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5816, the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2026-24175, and the CVE record at https://www.cve.org/CVERecord?id=CVE-2026-24175. Security practitioners should consult these resources for version-specific remediation guidance.
Details
- CWE(s)