Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

A crucial container escape vulnerability has emerged within the NVIDIA Container Toolkit, threatening the safety basis of AI infrastructure worldwide.

Dubbed “NVIDIAScape” and tracked as CVE-2025-23266, this flaw carries a most CVSS rating of 9.0, representing one of the extreme threats to cloud-based AI providers found up to now.

The vulnerability permits malicious actors to interrupt free from container isolation and obtain full root-level management over host techniques working GPU-accelerated workloads.

The exploit’s devastating simplicity units it aside from conventional complicated assault vectors.

Researchers have demonstrated {that a} mere three-line Dockerfile can weaponize this vulnerability, enabling attackers to bypass all container safety boundaries.

The malicious payload leverages the Linux LD_PRELOAD setting variable to inject code into privileged processes throughout container initialization, remodeling what needs to be remoted workloads into system-compromising threats.

Wiz.io analysts recognized that the vulnerability stems from a basic flaw in how the NVIDIA Container Toolkit handles Open Container Initiative (OCI) hooks.

Arbitrary photos loading (Supply – Wiz.io)

The toolkit, which serves because the crucial bridge between containerized AI functions and NVIDIA GPUs, inadvertently inherits setting variables from container photos throughout the createContainer hook execution part.

This creates an assault floor the place malicious setting variables can affect privileged host processes, main to finish system compromise.

Technical technique of the assault

The assault vector exploits the container runtime’s belief relationship with the NVIDIA Container Toolkit.

When a malicious container picture incorporates the setting variable LD_PRELOAD=/proc/self/cwd/poc.so, the toolkit’s privileged hook course of hundreds and executes the attacker’s shared library file immediately from the container filesystem. The exploit code demonstrates this method:-

FROM busybox
ENV LD_PRELOAD=/proc/self/cwd/poc.so
ADD poc.so /

This deceptively easy payload grants rapid root entry to the underlying host system, bypassing all container isolation mechanisms.

The vulnerability impacts all NVIDIA Container Toolkit variations as much as v1.17.7 and poses systemic dangers to multi-tenant AI cloud environments the place prospects deploy customized container photos on shared GPU infrastructure.

Organizations using managed AI providers from main cloud suppliers face rapid publicity, as a single malicious container may compromise total host techniques and entry delicate information belonging to a number of tenants.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Container, Critical, Exploit, Nvidia, PoC, Released, Toolkit, Vulnerability

Post navigation

Previous Post: New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System
Next Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse

Related Posts

Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Cyber Security News
ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark