Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models

Posted on August 4, 2025August 4, 2025 By CWS

Cloud safety large Wiz has disclosed one other set of vulnerabilities that may pose a big threat to AI methods that depend on Nvidia merchandise, on this case the corporate’s Triton Inference Server. 

Nvidia introduced in an advisory printed on Monday that greater than a dozen vulnerabilities have been patched in Triton Inference Server, an open supply software program that permits customers to deploy any AI mannequin from varied deep studying and machine studying frameworks.

Researchers at Wiz have found three vulnerabilities (CVE-2025-23319, CVE-2025-23320 and CVE-2025-23334) that may be chained by a distant, unauthenticated attacker to execute arbitrary code and take full management of a server.

CVE-2025-23319 and CVE-2025-23320 are high-severity points affecting the Python backend of Triton Inference Server for Home windows and Linux. The previous could be exploited for distant code execution, DoS assaults, knowledge tampering, or data disclosure, whereas the latter can result in data disclosure.

CVE-2025-23334 has been assigned a ‘medium severity’ score. It additionally impacts the Python backend and it could result in data disclosure. 

In keeping with Wiz, the exploit chain begins with a minor data leak and escalates to a full system compromise. 

“This poses a important threat to organizations utilizing Triton for AI/ML, as a profitable assault may result in the theft of worthwhile AI fashions, publicity of delicate knowledge, manipulating the AI mannequin’s responses and a foothold for attackers to maneuver deeper right into a community,” Wiz defined.

The safety agency printed a weblog put up on Monday to share the technical particulars of its findings.  Commercial. Scroll to proceed studying.

This new analysis comes a few weeks after Wiz disclosed NVIDIAScape, an Nvidia Container Toolkit flaw that may be exploited for full management of the host machine. Wiz warned on the time that the difficulty posed a critical risk to managed AI cloud providers.

Associated: AI Guardrails Underneath Hearth: Cisco’s Jailbreak Demo Exposes AI Weak Factors

Associated: A number of Vulnerabilities Patched in AI Code Editor Cursor

Associated: Browser Extensions Pose Severe Risk to Gen-AI Instruments Dealing with Delicate Knowledge

Security Week News Tags:Big, Models, Nvidia, Pose, Risk, Triton, Vulnerabilities

Post navigation

Previous Post: LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware
Next Post: SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware

Related Posts

Four Arrested in UK Over M&S, Co-op Cyberattacks Security Week News
SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Security Week News
Red Access Raises $17 Million for Agentless Security Platform Security Week News
Password Managers Vulnerable to Data Theft via Clickjacking Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases
  • CISA Analyzes Malware From Ivanti EPMM Intrusions
  • How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines
  • Netskope Raises Over $908 Million in IPO
  • New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases
  • CISA Analyzes Malware From Ivanti EPMM Intrusions
  • How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines
  • Netskope Raises Over $908 Million in IPO
  • New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News