NVIDIA DGX Spark Privilege Escalation and Hardware Control Vulnerabilities
NVIDIA DGX Spark GB10 systems are affected by two critical vulnerabilities, CVE-2025-33187 and CVE-2025-33188, which could allow attackers to escalate privileges and manipulate hardware controls. CVE-2025-33187 is a critical flaw in the SROOT component, enabling attackers with privileged access to gain entry to SoC protected areas, potentially resulting in code execution, information disclosure, data tampering, denial of service, or further privilege escalation. CVE-2025-33188 involves hardware resource manipulation, where successful exploitation could lead to information disclosure, data tampering, or denial of service. Both vulnerabilities are not remotely exploitable but pose significant risks if local access is obtained.
NVIDIA has released critical patches to address these vulnerabilities, with CVE-2025-33187 carrying a CVSS score of 9.3 and CVE-2025-33188 rated at 8.0. Organizations using NVIDIA DGX Spark hardware are urged to apply the updates immediately to mitigate the risk of exploitation. The vulnerabilities highlight the importance of securing AI infrastructure, as exploitation could expose sensitive AI secrets and compromise system integrity. No affected product versions have been explicitly listed, but the advisories emphasize the urgency of remediation for all DGX Spark GB10 deployments.
Timeline
Nov 25, 2025
NVIDIA publishes CVE-2025-33188 for DGX Spark hardware control tampering
NVIDIA PSIRT published CVE-2025-33188, a high-severity vulnerability in NVIDIA DGX Spark GB10 involving tampering with hardware controls. Successful exploitation could lead to information disclosure, data tampering, or denial of service, and NVIDIA recommended firmware updates, strict hardware-management access controls, and log monitoring.
Nov 25, 2025
NVIDIA publishes CVE-2025-33187 for DGX Spark GB10 privilege escalation
NVIDIA disclosed CVE-2025-33187 affecting DGX Spark GB10, a critical privilege-escalation flaw with a reported CVSS score of 9.3 that could expose sensitive AI-related secrets and enable system takeover. The disclosure appears in vulnerability records published on November 25, 2025.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Vulnerabilities
Sources
Related Stories

Critical Vulnerabilities in NVIDIA Isaac Launchable Allow Remote Code Execution and Privilege Escalation
NVIDIA has disclosed multiple critical vulnerabilities in its Isaac Launchable product, each carrying a CVSS v3.1 base score of 9.8, indicating a severe risk to affected systems. The vulnerabilities include two privilege escalation flaws (CVE-2025-33223 and CVE-2025-33224) that allow attackers to execute code with unnecessary privileges, potentially leading to code execution, escalation of privileges, denial of service, information disclosure, and data tampering. Additionally, a hard-coded credential vulnerability (CVE-2025-33222) could be exploited to achieve similar impacts, including unauthorized access and manipulation of system data. All vulnerabilities are remotely exploitable and require immediate attention. NVIDIA has released security updates to address these issues and strongly recommends that users download and install the latest version of Isaac Launchable to mitigate the risks. The official security bulletin provides detailed descriptions of each CVE, their associated CWE categories, and the potential impacts. Organizations using NVIDIA Isaac Launchable should prioritize patching to prevent exploitation, as the vulnerabilities could be leveraged by remote attackers without user interaction or prior authentication.
1 months ago
NVIDIA Display Driver DLL Loading Vulnerability and Related High-Severity Flaws
NVIDIA has disclosed a high-severity vulnerability in its Display Driver, identified as CVE-2025-23309, which involves an uncontrolled DLL loading path. This flaw could allow attackers to cause arbitrary denial of service, escalate privileges, execute code, or tamper with data on affected systems. The vulnerability is not remotely exploitable, indicating that an attacker would require local access to exploit the issue. According to the official CVE entry, the vulnerability was published on October 10, 2025, and is being tracked by NVIDIA’s Product Security Incident Response Team (PSIRT). While the specific affected product versions are not listed in the CVE feed, the issue is confirmed to impact NVIDIA Display Driver software. In parallel, security reports highlight that NVIDIA has released patches addressing multiple high-severity vulnerabilities in its GPU drivers, some of which risk remote code execution (RCE) and privilege escalation. These patches are part of NVIDIA’s ongoing efforts to mitigate risks associated with their graphics drivers, which are widely used in both consumer and enterprise environments. The vulnerabilities addressed in the latest update could potentially be leveraged by attackers to gain unauthorized access or control over systems running vulnerable driver versions. Organizations using NVIDIA GPU drivers are strongly advised to review the latest security advisories and apply the recommended patches to reduce exposure. The disclosure underscores the importance of maintaining up-to-date drivers, as vulnerabilities in such low-level system components can have significant security implications. Security teams should also monitor for any signs of exploitation attempts targeting these flaws, especially in environments where local access by untrusted users is possible. The high CVSS score of 8.2 for CVE-2025-23309 reflects the potential impact of successful exploitation. NVIDIA’s prompt response and patch release demonstrate the company’s commitment to addressing security issues in its products. Enterprises should ensure that their asset inventories accurately reflect the presence of NVIDIA drivers and prioritize patching accordingly. The incident also highlights the broader trend of attackers targeting device drivers as a means to bypass operating system security controls. Given the critical role of GPU drivers in system performance and security, timely remediation is essential to prevent potential compromise. Security advisories from both NVIDIA and independent security researchers provide detailed guidance on mitigation steps. Regular vulnerability management processes should incorporate driver updates as a key component of endpoint security. Finally, organizations should consider implementing additional controls, such as application whitelisting and user privilege restrictions, to further reduce the risk of exploitation.
1 months ago
Critical Code Execution Vulnerability in NVIDIA Isaac Lab AI Framework
A critical deserialization vulnerability (CVE-2025-32210) was discovered in NVIDIA Isaac Lab, a component of the NVIDIA Isaac Sim framework, allowing attackers with low privileges and minimal user interaction to execute arbitrary code on affected systems. The flaw, categorized as CWE-502, affects all versions of Isaac Lab prior to v2.3.0 and carries a CVSS score of 9.0, indicating a high risk to confidentiality, integrity, and availability. NVIDIA responded by releasing a security update that implements proper input validation and secure data handling, urging all users to upgrade to Isaac Lab v2.3.0 immediately to mitigate the risk of exploitation. The vulnerability also prompted broader advisories regarding critical security patches for NVIDIA's AI platforms, including both Isaac Lab and the NeMo Framework, due to the risk of full code execution if left unpatched. Organizations using these AI tools are strongly advised to verify their deployments and apply the latest security updates across all environments. The urgency of the patch is underscored by the potential for attackers to achieve complete system compromise through network-based attacks requiring only low-level access and user interaction.
1 months ago