CVE-2025-33231
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-02-02
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | cuda_toolkit | to 13.1.0 (exc) |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in NVIDIA Nsight Systems for Windows is due to an insecure DLL loading mechanism where the application uses uncontrolled search path elements. An attacker with local access and low privileges, requiring user interaction, could exploit this flaw to execute arbitrary code, escalate privileges, tamper with data, cause denial of service, or disclose information. It is classified under CWE-427 (Uncontrolled Search Path Element). [1, 2]
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to serious impacts including execution of arbitrary code, escalation of privileges, data tampering, denial of service, and information disclosure. This affects the confidentiality, integrity, and availability of the system, potentially compromising system security and user data. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade NVIDIA Nsight Systems for Windows to CUDA Toolkit version 13.1 or later, as this version addresses the insecure DLL loading mechanism causing the vulnerability. [1]