Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking

Posted on July 18, 2025July 18, 2025 By CWS

Researchers at cloud safety specialist Wiz have found a vital vulnerability in Nvidia’s Container Toolkit and warned that it will probably pose a severe menace to managed AI cloud providers. 

The vulnerability has been dubbed NVIDIAScape and is formally tracked as CVE-2025-23266. The flaw was demonstrated earlier this 12 months on the Pwn2Own Berlin hacking competitors by Wiz researchers, who earned $30,000 for his or her exploit.

Nvidia knowledgeable clients in regards to the vulnerability and the provision of a patch in an advisory printed final week. The seller says this vital vulnerability (CVSS rating of 9.0) can enable privilege escalation, info disclosure, information tampering and DoS assaults.

The Nvidia Container Toolkit is designed for constructing and working GPU-accelerated containers, and Wiz says it’s usually utilized by main cloud suppliers for managed AI providers. 

Based on Wiz, CVE-2025-23266 is brought on by a misconfiguration associated to the dealing with of Open Container Initiative (OCI) hooks, which allow customers to outline and execute actions at specified factors in a container’s lifecycle. 

The most important danger is within the case of managed AI cloud providers that enable customers to run their very own containers on shared GPU infrastructure. 

The NVIDIAScape vulnerability might be exploited by a malicious container to bypass isolation and achieve full root entry to the host machine. From the host machine the menace actor could possibly steal or manipulate delicate information and proprietary AI fashions of all the opposite clients utilizing the identical {hardware}.

Wiz has shared technical particulars on the vulnerability and confirmed how it may be exploited with a malicious payload and a three-line Docker file positioned inside a container picture.Commercial. Scroll to proceed studying.

“This analysis highlights, not for the primary time, that containers should not a robust safety barrier and shouldn’t be relied upon as the only real technique of isolation,” Wiz warned. “When designing functions, particularly for multi-tenant environments, one ought to at all times ‘assume a vulnerability’ and implement no less than one sturdy isolation barrier, resembling virtualization.”

Associated: Watch on Demand: Cloud & Information Safety Summit

Associated: 5 Zero-Days, 15 Misconfigurations Present in Salesforce Trade Cloud

Associated: Contained in the $111 Billion Cloud Safety Market: Acquisition, Growth, and The place to Purpose Subsequent

Security Week News Tags:Cloud, Critical, Exposes, Flaw, Hacking, Nvidia, Services, Toolkit

Post navigation

Previous Post: Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Next Post: Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet

Related Posts

US Announces $100 Million for State, Local and Tribal Cybersecurity Security Week News
API Security Firm Wallarm Raises $55 Million Security Week News
SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware Security Week News
160,000 Impacted by Valsoft Data Breach Security Week News
Google Researchers Find New Chrome Zero-Day Security Week News
Canadian Electric Utility Lists Customer Information Stolen by Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News