Raleigh, NC

32°F
Clear Sky Humidity: 91%
Wind: 0 M/S

Researchers Find New Hack That Bypasses NVIDIA's Security

Researchers Find New Hack That Bypasses NVIDIA's Security

Cybersecurity researchers have discovered a new security flaw in the NVIDIA Container Toolkit,

allowing attackers to bypass container isolation and gain full access to the host system.

The vulnerability, CVE-2025-23359 (CVSS score: 8.3), affects the following versions: 

  • NVIDIA Container Toolkit (All versions up to 1.17.3) – Fixed in 1.17.4 

  • NVIDIA GPU Operator (All versions up to 24.9.1) – Fixed in 24.9.2 

This flaw is a bypass for a previously patched vulnerability, meaning attackers could still exploit systems that haven't updated to the latest versions. Organizations using NVIDIA GPU containers are urged to apply patches immediately to prevent potential security risks. 

NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system," the company said in an advisory on Tuesday. 

"A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." 

Cloud security firm Wiz, which shared additional technical specifics of the flaw, said it's a bypass for another vulnerability (CVE-2024-0132, CVSS score: 9.0) that was addressed by NVIDIA in September 2024.  

In a nutshell, the vulnerability enables bad actors to mount the host's root file system into a container, granting them unfettered access to all files. Furthermore, the  access can be leveraged to launch privileged containers and achieve full host compromise via the runtime Unix socket. 

Wiz researchers security researchers Shir Tamari, Ronen Shustin, and Andres Riancho said their source code analysis of the container toolkit found that the file paths used during mount operations could be manipulated using a symbolic link such that it makes it possible to mount from outside the container (i.e., the root directory) into a path within "/usr/lib64." 

Attackers exploiting the NVIDIA Container Toolkit vulnerability initially gain read-only access to the host file system. However, this restriction can be bypassed by leveraging Unix sockets to launch new privileged containers, ultimately granting full control over the file system. 

With this escalated access, threat actors can: 
Monitor network traffic 
Debug and manipulate active processes 
Execute various host-level operations 

To mitigate this risk, security researchers advise updating to the latest patched version. Additionally, organizations should ensure that the "--no-cntlibs" flag remains enabled in production environments to prevent exploitation. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.