CVE-2026-24207
Received
Received - Intake
Authentication Bypass in NVIDIA Triton Inference Server
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: NVIDIA Corporation
Description
Description
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause an authentication bypass. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | triton_inference_server | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-24207 is a vulnerability in the NVIDIA Triton Inference Server that allows an attacker to bypass authentication.
This means an attacker can gain unauthorized access without proper credentials.
The vulnerability is classified as an authentication bypass using an alternate path or channel (CWE-288).
How can this vulnerability impact me? :
Exploiting this vulnerability could lead to several severe impacts including:
- Code execution by the attacker
- Escalation of privileges
- Data tampering
- Denial of service
- Information disclosure
The vulnerability has a critical CVSS v3.1 base score of 9.8, indicating high severity and ease of exploitation.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70