Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

A crucial container escape vulnerability has emerged within the NVIDIA Container Toolkit, threatening the safety basis of AI infrastructure worldwide.

Dubbed “NVIDIAScape” and tracked as CVE-2025-23266, this flaw carries a most CVSS rating of 9.0, representing one of the extreme threats to cloud-based AI providers found up to now.

The vulnerability permits malicious actors to interrupt free from container isolation and obtain full root-level management over host techniques working GPU-accelerated workloads.

The exploit’s devastating simplicity units it aside from conventional complicated assault vectors.

Researchers have demonstrated {that a} mere three-line Dockerfile can weaponize this vulnerability, enabling attackers to bypass all container safety boundaries.

The malicious payload leverages the Linux LD_PRELOAD setting variable to inject code into privileged processes throughout container initialization, remodeling what needs to be remoted workloads into system-compromising threats.

Wiz.io analysts recognized that the vulnerability stems from a basic flaw in how the NVIDIA Container Toolkit handles Open Container Initiative (OCI) hooks.

Arbitrary photos loading (Supply – Wiz.io)

The toolkit, which serves because the crucial bridge between containerized AI functions and NVIDIA GPUs, inadvertently inherits setting variables from container photos throughout the createContainer hook execution part.

This creates an assault floor the place malicious setting variables can affect privileged host processes, main to finish system compromise.

Technical technique of the assault

The assault vector exploits the container runtime’s belief relationship with the NVIDIA Container Toolkit.

When a malicious container picture incorporates the setting variable LD_PRELOAD=/proc/self/cwd/poc.so, the toolkit’s privileged hook course of hundreds and executes the attacker’s shared library file immediately from the container filesystem. The exploit code demonstrates this method:-

FROM busybox
ENV LD_PRELOAD=/proc/self/cwd/poc.so
ADD poc.so /

This deceptively easy payload grants rapid root entry to the underlying host system, bypassing all container isolation mechanisms.

The vulnerability impacts all NVIDIA Container Toolkit variations as much as v1.17.7 and poses systemic dangers to multi-tenant AI cloud environments the place prospects deploy customized container photos on shared GPU infrastructure.

Organizations using managed AI providers from main cloud suppliers face rapid publicity, as a single malicious container may compromise total host techniques and entry delicate information belonging to a number of tenants.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Container, Critical, Exploit, Nvidia, PoC, Released, Toolkit, Vulnerability

Post navigation

Previous Post: New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System
Next Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse

Related Posts

Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Cyber Security News
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News
CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware Cyber Security News
Gunra Ransomware Group Leaks 40TB of Data from American Hospital Cyber Security News
CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark