Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation

NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation

Posted on November 14, 2025November 14, 2025 By CWS

NVIDIA has issued a essential safety replace addressing two high-severity vulnerabilities in its NeMo Framework that might permit attackers to execute malicious code and escalate privileges on affected techniques.

The vulnerabilities, tracked as CVE-2025-23361 and CVE-2025-33178, each carry a CVSS rating of seven.8 and have an effect on all variations of the NeMo Framework earlier than model 2.5.0 throughout all platforms.

NVIDIA NeMo Framework Vulnerabilities

The primary vulnerability, CVE-2025-23361, exists in a framework script, the place malicious enter from an attacker could trigger improper management over code technology.

The second flaw, CVE-2025-33178, resides within the Bert companies element and allows code injection via malicious knowledge.

Each vulnerabilities share the identical assault vector and require native entry with low privileges.

CVE IDDescriptionCVSS ScoreCWECVE-2025-23361Improper management of code technology in framework script7.8CWE-94CVE-2025-33178Code injection in bert companies component7.8CWE-94

Profitable exploitation may lead to code execution, privilege escalation, info disclosure, and knowledge manipulation, posing vital dangers to organizations utilizing the framework.

The vulnerabilities have been found and reported by safety researchers from TencentAISec and NISL lab at Tsinghua College, highlighting the significance of collaborative safety analysis.

All variations of the NVIDIA NeMo Framework earlier than 2.5.0 are susceptible, no matter working system or platform. Organizations utilizing earlier software program department releases are additionally in danger and will improve instantly.

NVIDIA recommends that customers clone or replace to the NeMo Framework model 2.5.0 or later, obtainable from the official NVIDIA GitHub repository and the PyPI package deal supervisor.

The corporate emphasizes that customers on earlier department releases ought to improve to the newest department model.

Organizations ought to assess their particular configurations and apply the safety replace promptly to mitigate potential exploitation dangers.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Escalation, Framework, Injection, NeMo, Nvidia, Privilege, Vulnerabilities

Post navigation

Previous Post: SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
Next Post: Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

Related Posts

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Cyber Security News
Top 10 Best API Penetration Testing Companies In 2025 Top 10 Best API Penetration Testing Companies In 2025 Cyber Security News
Critical Microsoft 365 Copilot Flaws Resolved by Microsoft Critical Microsoft 365 Copilot Flaws Resolved by Microsoft Cyber Security News
Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark