CVE-2025-23284
BaseFortify
Publication date: 2025-08-02
Last updated on: 2025-08-04
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | vgpu_software | * |
| nvidia | gpu_display_driver | 577.00 |
| nvidia | gpu_display_driver | 539.41 |
| nvidia | gpu_display_driver | 573.48 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in NVIDIA vGPU software's Virtual GPU Manager, where a malicious guest can trigger a stack buffer overflow. This means that an attacker with limited privileges could exploit this flaw to execute arbitrary code, cause denial of service, disclose sensitive information, or tamper with data.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to severe impacts including unauthorized code execution, service disruption (denial of service), leakage of confidential information, and unauthorized modification of data, potentially compromising system integrity and availability.