Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition

NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition

Posted on December 15, 2025December 16, 2025 By CWS

Safety patches for the Merlin framework addressing two high-severity deserialization vulnerabilities. That might enable attackers to execute arbitrary code and launch denial-of-service assaults on affected Linux methods.

NVIDIA researchers have recognized two vulnerabilities in Merlin parts that leverage insecure deserialization.

Each CVE-2025-33214 and CVE-2025-33213 carry CVSS base scores of 8.8, indicating high-severity threats that require speedy consideration from system directors.

CVE IDDescriptionBase ScoreCWEVectorCVE-2025-33214NVIDIA NVTabular for Linux incorporates a vulnerability within the Workflow element, the place a person might trigger a deserialization situation. 8.8CWE-502AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2025-33213NVIDIA Merlin Transformers4Rec for Linux incorporates a vulnerability within the Coach element the place a person could trigger a deserialization situation. 8.8CWE-502AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Crucial Deserialization Flaws Found

The vulnerabilities have an effect on NVTabular’s Workflow element and Transformers4Rec’s Coach element.

Profitable exploitation permits attackers to execute malicious code, set off denial-of-service situations, disclose delicate data, and tamper with important knowledge.

The assault vector requires low-complexity community entry and person interplay, making these vulnerabilities notably regarding for enterprise environments.

All variations of NVIDIA NVTabular and Merlin Transformers4Rec for Linux that lack particular safety commits are susceptible to those assaults.

Organizations working these frameworks should instantly replace their installations to guard towards potential exploits. NVIDIA has launched safety patches by means of GitHub commits.

For NVTabular, customers should replace to commit 5dd11f4 or later from the NVIDIA-Merlin/NVTabular repository. Transformers4Rec customers want to use commit 876f19e or later from the NVIDIA-Merlin/Transformers4Rec repository.

NVIDIA acknowledged the safety researcher for responsibly disclosing each vulnerabilities by means of coordinated disclosure.

The corporate launched the preliminary safety bulletin on December 9, 2025, offering remediation steering to affected organizations.

System directors ought to prioritize updating NVIDIA Merlin installations by cloning or updating the software program to incorporate the safety commits.

Organizations ought to go to NVIDIA Product Safety pages for added vulnerability data and subscribe to safety bulletin notifications for future updates.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, Condition, DoS, Execute, Malicious, Merlin, Nvidia, Trigger, Vulnerabilities

Post navigation

Previous Post: Apache StreamPark Vulnerability Let Attackers Access Sensitive Data
Next Post: New Android Malware Frogblight Mimics as Official Government Websites to Collect SMS and Device Details

Related Posts

OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes Cyber Security News
Critical SQL Injection Flaw Patched in SAP S/4HANA Critical SQL Injection Flaw Patched in SAP S/4HANA Cyber Security News
Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users Cyber Security News
Critical Chrome 0-Day Flaws Demand Immediate Action Critical Chrome 0-Day Flaws Demand Immediate Action Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark