CVE-2026-24186
Deserialization Vulnerability in NVIDIA FLARE SDK Enables Code Execution
Publication date: 2026-04-28
Last updated on: 2026-05-04
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | nvflare | to 2.7.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-24186 is a high-severity vulnerability found in the NVIDIA FLARE SDK, specifically in its FOBS component. The vulnerability involves the unsafe deserialization of untrusted data, where an attacker can send a malicious FOBS-encoded message that triggers this unsafe deserialization process.
If successfully exploited, this vulnerability may allow the attacker to execute arbitrary code remotely on the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including remote code execution, which means an attacker could potentially take control of the affected system.
- Confidentiality impact: High - sensitive data could be exposed.
- Integrity impact: High - data or system integrity could be compromised.
- Availability impact: High - system availability could be disrupted.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is important to prevent the processing of untrusted FOBS-encoded messages by the NVIDIA FLARE SDK.
Since the vulnerability involves unsafe deserialization triggered by malicious messages, immediate steps include restricting network access to the vulnerable component, applying any official patches or updates released by NVIDIA, and monitoring for suspicious activity related to FOBS message handling.