CVE-2026-24217
Received Received - Intake
Path Traversal in NVIDIA BioNeMo Core for Linux

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: NVIDIA Corporation

Description
NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-21
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nvidia bionemo_core From 2026-05-20 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-29 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24217 is a vulnerability in NVIDIA BioNeMo Core for Linux that allows a user to perform a path traversal by loading a malicious file.

This path traversal weakness (CWE-29) enables an attacker to access files and directories outside the intended scope, potentially leading to unauthorized actions.

Exploitation of this vulnerability could result in code execution, denial of service, information disclosure, and data tampering.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in NVIDIA BioNeMo Core for Linux allows for path traversal leading to potential code execution, denial of service, information disclosure, and data tampering.

Such impactsβ€”especially information disclosure and data tamperingβ€”could negatively affect compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive data and system integrity.

However, the provided context and resources do not explicitly discuss or analyze the effects of this vulnerability on compliance with these standards.


How can this vulnerability impact me? :

If exploited, this vulnerability can have severe impacts including:

  • Code execution - an attacker could run arbitrary code on the affected system.
  • Denial of service - the system or application could be made unavailable.
  • Information disclosure - sensitive data could be exposed to unauthorized users.
  • Data tampering - data integrity could be compromised by unauthorized modifications.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart