CVE-2025-23284
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-02

Last updated on: 2025-08-04

Assigner: NVIDIA Corporation

Description
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause a stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-02
Last Modified
2025-08-04
Generated
2026-05-07
AI Q&A
2025-08-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
nvidia vgpu_software *
nvidia gpu_display_driver 577.00
nvidia gpu_display_driver 539.41
nvidia gpu_display_driver 573.48
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in NVIDIA vGPU software's Virtual GPU Manager, where a malicious guest can trigger a stack buffer overflow. This means that an attacker with limited privileges could exploit this flaw to execute arbitrary code, cause denial of service, disclose sensitive information, or tamper with data.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to severe impacts including unauthorized code execution, service disruption (denial of service), leakage of confidential information, and unauthorized modification of data, potentially compromising system integrity and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart