Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation

NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation

Posted on November 14, 2025November 14, 2025 By CWS

NVIDIA has issued a essential safety replace addressing two high-severity vulnerabilities in its NeMo Framework that might permit attackers to execute malicious code and escalate privileges on affected techniques.

The vulnerabilities, tracked as CVE-2025-23361 and CVE-2025-33178, each carry a CVSS rating of seven.8 and have an effect on all variations of the NeMo Framework earlier than model 2.5.0 throughout all platforms.

NVIDIA NeMo Framework Vulnerabilities

The primary vulnerability, CVE-2025-23361, exists in a framework script, the place malicious enter from an attacker could trigger improper management over code technology.

The second flaw, CVE-2025-33178, resides within the Bert companies element and allows code injection via malicious knowledge.

Each vulnerabilities share the identical assault vector and require native entry with low privileges.

CVE IDDescriptionCVSS ScoreCWECVE-2025-23361Improper management of code technology in framework script7.8CWE-94CVE-2025-33178Code injection in bert companies component7.8CWE-94

Profitable exploitation may lead to code execution, privilege escalation, info disclosure, and knowledge manipulation, posing vital dangers to organizations utilizing the framework.

The vulnerabilities have been found and reported by safety researchers from TencentAISec and NISL lab at Tsinghua College, highlighting the significance of collaborative safety analysis.

All variations of the NVIDIA NeMo Framework earlier than 2.5.0 are susceptible, no matter working system or platform. Organizations utilizing earlier software program department releases are additionally in danger and will improve instantly.

NVIDIA recommends that customers clone or replace to the NeMo Framework model 2.5.0 or later, obtainable from the official NVIDIA GitHub repository and the PyPI package deal supervisor.

The corporate emphasizes that customers on earlier department releases ought to improve to the newest department model.

Organizations ought to assess their particular configurations and apply the safety replace promptly to mitigate potential exploitation dangers.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Escalation, Framework, Injection, NeMo, Nvidia, Privilege, Vulnerabilities

Post navigation

Previous Post: SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
Next Post: Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

Related Posts

CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host Cyber Security News
Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University Cyber Security News
NIST Unveils Cybersecurity and Workforce Management Guide NIST Unveils Cybersecurity and Workforce Management Guide Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
Microsoft Enhances Teams with AI-Powered Workflows Microsoft Enhances Teams with AI-Powered Workflows Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark