Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking

Posted on July 18, 2025July 18, 2025 By CWS

Researchers at cloud safety specialist Wiz have found a vital vulnerability in Nvidia’s Container Toolkit and warned that it will probably pose a severe menace to managed AI cloud providers. 

The vulnerability has been dubbed NVIDIAScape and is formally tracked as CVE-2025-23266. The flaw was demonstrated earlier this 12 months on the Pwn2Own Berlin hacking competitors by Wiz researchers, who earned $30,000 for his or her exploit.

Nvidia knowledgeable clients in regards to the vulnerability and the provision of a patch in an advisory printed final week. The seller says this vital vulnerability (CVSS rating of 9.0) can enable privilege escalation, info disclosure, information tampering and DoS assaults.

The Nvidia Container Toolkit is designed for constructing and working GPU-accelerated containers, and Wiz says it’s usually utilized by main cloud suppliers for managed AI providers. 

Based on Wiz, CVE-2025-23266 is brought on by a misconfiguration associated to the dealing with of Open Container Initiative (OCI) hooks, which allow customers to outline and execute actions at specified factors in a container’s lifecycle. 

The most important danger is within the case of managed AI cloud providers that enable customers to run their very own containers on shared GPU infrastructure. 

The NVIDIAScape vulnerability might be exploited by a malicious container to bypass isolation and achieve full root entry to the host machine. From the host machine the menace actor could possibly steal or manipulate delicate information and proprietary AI fashions of all the opposite clients utilizing the identical {hardware}.

Wiz has shared technical particulars on the vulnerability and confirmed how it may be exploited with a malicious payload and a three-line Docker file positioned inside a container picture.Commercial. Scroll to proceed studying.

“This analysis highlights, not for the primary time, that containers should not a robust safety barrier and shouldn’t be relied upon as the only real technique of isolation,” Wiz warned. “When designing functions, particularly for multi-tenant environments, one ought to at all times ‘assume a vulnerability’ and implement no less than one sturdy isolation barrier, resembling virtualization.”

Associated: Watch on Demand: Cloud & Information Safety Summit

Associated: 5 Zero-Days, 15 Misconfigurations Present in Salesforce Trade Cloud

Associated: Contained in the $111 Billion Cloud Safety Market: Acquisition, Growth, and The place to Purpose Subsequent

Security Week News Tags:Cloud, Critical, Exposes, Flaw, Hacking, Nvidia, Services, Toolkit

Post navigation

Previous Post: Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Next Post: Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet

Related Posts

Cisco Warns of Hardcoded Credentials in Enterprise Software Security Week News
Four Arrested in UK Over M&S, Co-op Cyberattacks Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Madhu Gottumukkala Officially Appointed CISA Deputy Director Security Week News
Godfather Android Trojan Creates Sandbox on Infected Devices Security Week News
Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News