CVE-2025-33248
Received Received - Intake
Remote Code Execution in NVIDIA Megatron-LM Hybrid Conversion Script

Publication date: 2026-03-24

Last updated on: 2026-03-25

Assigner: NVIDIA Corporation

Description
NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nvidia megatron-lm to 0.15.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2025-33248 is a vulnerability in NVIDIA Megatron-LM's hybrid conversion script. An attacker can exploit this flaw by convincing a user to load a maliciously crafted file, which leads to remote code execution (RCE)."}, {'type': 'paragraph', 'content': 'This vulnerability is classified under CWE-502: Deserialization of Untrusted Data, meaning it arises from unsafe handling of data that can be manipulated by an attacker.'}, {'type': 'paragraph', 'content': 'Exploiting this vulnerability can result in code execution, escalation of privileges, information disclosure, and data tampering.'}] [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can have severe impacts including unauthorized code execution on the affected system.

  • Escalation of privileges, allowing attackers to gain higher access rights.
  • Information disclosure, potentially exposing sensitive data.
  • Data tampering, which can compromise data integrity.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart