CVE-2026-24209
Path Traversal in NVIDIA Triton Inference Server
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | triton_inference_server | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-24209 is a vulnerability in the NVIDIA Triton Inference Server involving a path traversal issue. This means an attacker could manipulate file paths to access directories and files outside the intended restricted area.
The flaw is categorized under CWE-22, which refers to improper limitation of a pathname to a restricted directory.
Exploiting this vulnerability could allow an attacker to cause a denial of service on the affected server.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to cause a denial of service (DoS) on the NVIDIA Triton Inference Server.
A denial of service means the server could become unavailable or unresponsive, disrupting any services or applications relying on it.
Since the vulnerability has a high severity score (CVSS 7.5), it represents a significant risk if exploited.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.