CVE-2025-33213
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | merlin_transformers4rec | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Trainer component of NVIDIA Merlin Transformers4Rec for Linux, where a user could cause a deserialization issue. Exploiting this vulnerability successfully might allow an attacker to execute arbitrary code, cause denial of service, disclose sensitive information, or tamper with data.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to execute arbitrary code on your system, disrupt services through denial of service attacks, disclose confidential information, and alter or tamper with your data, potentially compromising system integrity and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the NVIDIA Merlin Transformers4Rec component on Linux to versions including commit 876f19e or later, as these versions address the deserialization flaw in the Trainer component. [3]