CVE-2026-24207
Received Received - Intake
Authentication Bypass in NVIDIA Triton Inference Server

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: NVIDIA Corporation

Description
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause an authentication bypass. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nvidia triton_inference_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24207 is a vulnerability in the NVIDIA Triton Inference Server that allows an attacker to bypass authentication.

This means an attacker can gain unauthorized access without proper credentials.

The vulnerability is classified as an authentication bypass using an alternate path or channel (CWE-288).


How can this vulnerability impact me? :

Exploiting this vulnerability could lead to several severe impacts including:

  • Code execution by the attacker
  • Escalation of privileges
  • Data tampering
  • Denial of service
  • Information disclosure

The vulnerability has a critical CVSS v3.1 base score of 9.8, indicating high severity and ease of exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart