CVE-2025-33248
Remote Code Execution in NVIDIA Megatron-LM Hybrid Conversion Script
Publication date: 2026-03-24
Last updated on: 2026-03-25
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | megatron-lm | to 0.15.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2025-33248 is a vulnerability in NVIDIA Megatron-LM's hybrid conversion script. An attacker can exploit this flaw by convincing a user to load a maliciously crafted file, which leads to remote code execution (RCE)."}, {'type': 'paragraph', 'content': 'This vulnerability is classified under CWE-502: Deserialization of Untrusted Data, meaning it arises from unsafe handling of data that can be manipulated by an attacker.'}, {'type': 'paragraph', 'content': 'Exploiting this vulnerability can result in code execution, escalation of privileges, information disclosure, and data tampering.'}] [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can have severe impacts including unauthorized code execution on the affected system.
- Escalation of privileges, allowing attackers to gain higher access rights.
- Information disclosure, potentially exposing sensitive data.
- Data tampering, which can compromise data integrity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know