CVE-2026-24147
Information Disclosure and DoS via Model Upload in NVIDIA Triton Server
Publication date: 2026-04-07
Last updated on: 2026-04-16
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | triton_inference_server | to 26.02 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the vulnerability in NVIDIA Triton Inference Server impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-24147 is a medium severity vulnerability in the NVIDIA Triton Inference Server, specifically in the triton server component. It arises from improper limitation of a pathname to a restricted directory (CWE-22), meaning the server does not properly restrict file path access when processing uploaded model configurations.
An attacker can exploit this vulnerability by uploading a specially crafted or malicious model configuration to the server. This can lead to unauthorized information disclosure or cause denial of service conditions.
How can this vulnerability impact me? :
Exploitation of this vulnerability can result in two main impacts: information disclosure and denial of service.
- Information disclosure: An attacker may gain access to sensitive information by exploiting the improper path limitation.
- Denial of service: The attacker may cause the Triton server to become unavailable or disrupt its normal operation.
The vulnerability has a CVSS v3.1 base score of 4.8, indicating medium severity, with low confidentiality and availability impacts, no integrity impact, and requires no privileges or user interaction but has high attack complexity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability in the NVIDIA Triton Inference Server, users should update to Triton Inference Server version r26.02 or later.
This update addresses the vulnerability that allows an attacker to cause information disclosure or denial of service by uploading a specially crafted model configuration.