CVE-2025-23330
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-10-27
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | display_driver | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the NVIDIA Display Driver for Linux allows an attacker with local access to trigger a null pointer dereference, which can cause the system or service to crash, leading to a denial of service (DoS). It requires low privileges and no user interaction to exploit. [1]
How can this vulnerability impact me? :
Exploiting this vulnerability can cause denial of service by crashing the system or interrupting services, which may lead to downtime or loss of availability of affected systems running the NVIDIA Display Driver for Linux. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a null pointer dereference in the NVIDIA Display Driver for Linux that can cause denial of service. Detection would involve checking for system crashes or service interruptions related to the NVIDIA display driver. Since the vulnerability requires local access and low privileges, monitoring system logs for crashes or kernel oops related to the NVIDIA driver may help. Specific commands could include checking dmesg or syslog for relevant error messages, for example: 'dmesg | grep -i nvidia' or 'journalctl -k | grep -i nvidia'. However, no explicit detection commands are provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include limiting local access to trusted users only, as the vulnerability requires local access with low privileges. Monitoring for and applying any official patches or updates from NVIDIA as soon as they become available is recommended. Additionally, restricting or disabling the NVIDIA display driver usage on systems where it is not necessary may reduce risk. No specific mitigation commands or workarounds are provided in the available resources. [1]