Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability

PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

A crucial container escape vulnerability has emerged within the NVIDIA Container Toolkit, threatening the safety basis of AI infrastructure worldwide.

Dubbed “NVIDIAScape” and tracked as CVE-2025-23266, this flaw carries a most CVSS rating of 9.0, representing one of the extreme threats to cloud-based AI providers found up to now.

The vulnerability permits malicious actors to interrupt free from container isolation and obtain full root-level management over host techniques working GPU-accelerated workloads.

The exploit’s devastating simplicity units it aside from conventional complicated assault vectors.

Researchers have demonstrated {that a} mere three-line Dockerfile can weaponize this vulnerability, enabling attackers to bypass all container safety boundaries.

The malicious payload leverages the Linux LD_PRELOAD setting variable to inject code into privileged processes throughout container initialization, remodeling what needs to be remoted workloads into system-compromising threats.

Wiz.io analysts recognized that the vulnerability stems from a basic flaw in how the NVIDIA Container Toolkit handles Open Container Initiative (OCI) hooks.

Arbitrary photos loading (Supply – Wiz.io)

The toolkit, which serves because the crucial bridge between containerized AI functions and NVIDIA GPUs, inadvertently inherits setting variables from container photos throughout the createContainer hook execution part.

This creates an assault floor the place malicious setting variables can affect privileged host processes, main to finish system compromise.

Technical technique of the assault

The assault vector exploits the container runtime’s belief relationship with the NVIDIA Container Toolkit.

When a malicious container picture incorporates the setting variable LD_PRELOAD=/proc/self/cwd/poc.so, the toolkit’s privileged hook course of hundreds and executes the attacker’s shared library file immediately from the container filesystem. The exploit code demonstrates this method:-

FROM busybox
ENV LD_PRELOAD=/proc/self/cwd/poc.so
ADD poc.so /

This deceptively easy payload grants rapid root entry to the underlying host system, bypassing all container isolation mechanisms.

The vulnerability impacts all NVIDIA Container Toolkit variations as much as v1.17.7 and poses systemic dangers to multi-tenant AI cloud environments the place prospects deploy customized container photos on shared GPU infrastructure.

Organizations using managed AI providers from main cloud suppliers face rapid publicity, as a single malicious container may compromise total host techniques and entry delicate information belonging to a number of tenants.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Container, Critical, Exploit, Nvidia, PoC, Released, Toolkit, Vulnerability

Post navigation

Previous Post: New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System
Next Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse

Related Posts

Janela RAT Malware Targets Latin American Financial Sector Janela RAT Malware Targets Latin American Financial Sector Cyber Security News
AI ScamAgent Exposes Flaws in Autonomous Scam Prevention AI ScamAgent Exposes Flaws in Autonomous Scam Prevention Cyber Security News
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency Cyber Security News
Critical Docker Flaw Allows Unauthorized Host Access Critical Docker Flaw Allows Unauthorized Host Access Cyber Security News
Hackers Attempted to Misuse Claude AI to Launch Cyber Attacks Hackers Attempted to Misuse Claude AI to Launch Cyber Attacks Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark