Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking

Posted on July 18, 2025July 18, 2025 By CWS

Researchers at cloud safety specialist Wiz have found a vital vulnerability in Nvidia’s Container Toolkit and warned that it will probably pose a severe menace to managed AI cloud providers. 

The vulnerability has been dubbed NVIDIAScape and is formally tracked as CVE-2025-23266. The flaw was demonstrated earlier this 12 months on the Pwn2Own Berlin hacking competitors by Wiz researchers, who earned $30,000 for his or her exploit.

Nvidia knowledgeable clients in regards to the vulnerability and the provision of a patch in an advisory printed final week. The seller says this vital vulnerability (CVSS rating of 9.0) can enable privilege escalation, info disclosure, information tampering and DoS assaults.

The Nvidia Container Toolkit is designed for constructing and working GPU-accelerated containers, and Wiz says it’s usually utilized by main cloud suppliers for managed AI providers. 

Based on Wiz, CVE-2025-23266 is brought on by a misconfiguration associated to the dealing with of Open Container Initiative (OCI) hooks, which allow customers to outline and execute actions at specified factors in a container’s lifecycle. 

The most important danger is within the case of managed AI cloud providers that enable customers to run their very own containers on shared GPU infrastructure. 

The NVIDIAScape vulnerability might be exploited by a malicious container to bypass isolation and achieve full root entry to the host machine. From the host machine the menace actor could possibly steal or manipulate delicate information and proprietary AI fashions of all the opposite clients utilizing the identical {hardware}.

Wiz has shared technical particulars on the vulnerability and confirmed how it may be exploited with a malicious payload and a three-line Docker file positioned inside a container picture.Commercial. Scroll to proceed studying.

“This analysis highlights, not for the primary time, that containers should not a robust safety barrier and shouldn’t be relied upon as the only real technique of isolation,” Wiz warned. “When designing functions, particularly for multi-tenant environments, one ought to at all times ‘assume a vulnerability’ and implement no less than one sturdy isolation barrier, resembling virtualization.”

Associated: Watch on Demand: Cloud & Information Safety Summit

Associated: 5 Zero-Days, 15 Misconfigurations Present in Salesforce Trade Cloud

Associated: Contained in the $111 Billion Cloud Safety Market: Acquisition, Growth, and The place to Purpose Subsequent

Security Week News Tags:Cloud, Critical, Exposes, Flaw, Hacking, Nvidia, Services, Toolkit

Post navigation

Previous Post: Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Next Post: Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet

Related Posts

Iranian Hackers Target Defense and Government Officials in Ongoing Campaign Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News
SAP’s January 2026 Security Updates Patch Critical Vulnerabilities Security Week News
Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishers Abuse SharePoint in New Campaign Targeting Energy Sector
  • New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
  • Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements
  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishers Abuse SharePoint in New Campaign Targeting Energy Sector
  • New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
  • Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements
  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark