Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

Posted on November 27, 2025November 27, 2025 By CWS

An pressing safety replace for its DGX Spark AI workstation after discovering 14 vulnerabilities within the system’s firmware that would permit attackers to execute malicious code and launch denial-of-service assaults.

Essentially the most extreme flaw has a CVSS rating of 9.3 and impacts all DGX Spark units operating variations earlier than the brand new OTA0 replace.

The vulnerabilities reside in a number of firmware elements of the DGX Spark GB10, together with SROOT, OSROOT, and {hardware} useful resource controls.

NVIDIA’s Offensive Safety Analysis workforce recognized these flaws, which expose the AI workstation to critical safety dangers.

Attackers with native entry can exploit these weaknesses to bypass safety protections, modify {hardware} controls, and achieve unauthorized entry to protected areas of the system-on-chip.

The important vulnerability, tracked as CVE-2025-33187, permits attackers with privileged entry to breach SoC-protected areas.

CVE IDBase ScoreCWEPotential ImpactsCVE-2025-331879.3CWE-269Code execution, info disclosure, knowledge tampering, denial of service, escalation of privilegesCVE-2025-331888.0CWE-269Information disclosure, knowledge tampering, denial of serviceCVE-2025-331897.8CWE-787Code execution, knowledge tampering, denial of service, info disclosure, escalation of privilegesCVE-2025-331906.7CWE-787Code execution, knowledge tampering, denial of service, escalation of privilegesCVE-2025-331915.7CWE-20Denial of serviceCVE-2025-331925.7CWE-690Code execution, denial of service, info disclosureCVE-2025-331935.7CWE-354Code execution, denial of service, info disclosureCVE-2025-331945.7CWE-180Information disclosure, denial of serviceCVE-2025-331954.4CWE-119Data tampering, denial of service, escalation of privilegesCVE-2025-331964.4CWE-226Information disclosureCVE-2025-331974.3CWE-476Code execution, denial of serviceCVE-2025-331983.3CWE-226Information disclosureCVE-2025-331993.2CWE-670Data tamperingCVE-2025-332002.3CWE-226Information disclosure

Probably resulting in code execution, knowledge theft, system manipulation, denial-of-service assaults, or privilege escalation. This flaw requires quick consideration attributable to its important severity ranking and complete influence on system integrity.

All NVIDIA DGX Spark methods operating variations earlier than OTA0 are susceptible. The safety replace addresses all 14 CVEs concurrently.

NVIDIA urges prospects to obtain and set up the most recent DGX OS model instantly from the official NVIDIA DGX web site.

Customers also can go to the NVIDIA Product Safety web page to subscribe to safety bulletins and report potential safety points. The vulnerabilities primarily require native entry to take advantage of, although some might be triggered with out privileges.

Organizations utilizing DGX Spark workstations for AI growth and machine studying workloads ought to prioritize this replace to stop potential compromise of delicate AI fashions and coaching knowledge.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Attacks, Code, DGX, DoS, Execute, Malicious, Nvidia, Spark, Vulnerabilities

Post navigation

Previous Post: Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models
Next Post: Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Related Posts

Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet Cyber Security News
Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Cyber Security News
WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch Cyber Security News
Multiple Vulnerabilities in Tridium Niagara Framework Cyber Security News
LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments Cyber Security News
Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark