Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TrueConf zero-day exploited to attack Southeast Asian government networks

Healthcare data giant CareCloud announces that hackers have accessed patient medical records

Rivian spinoff also plans to build autonomous delivery vehicles for DoorDash

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A critical nvidia container toolkit flaw allows privilege escalation in AI cloud services
Identity

A critical nvidia container toolkit flaw allows privilege escalation in AI cloud services

By July 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 18, 2025Ravi LakshmananCloud Security / AI Security

Cybersecurity researchers have revealed a critical container escape vulnerability in the NVIDIA Container Toolkit.

The vulnerability tracked as CVE-2025-23266 has a CVSS score of 9.0 out of 10.0. It is codenamed nvidiascape by Cloud Security Company Wiz, owned by Google.

“The NVIDIA Container Toolkit for all platforms contains vulnerabilities in some hooks used to initialize containers. Attackers can increase their permissions and execute arbitrary code,” Nvidia said in their bug advisory.

Cybersecurity

“Successful use of this vulnerability could lead to privilege escalation, data tampering, information disclosure, and denial of service.”

This drawback affects NVIDIA GPU operators with 25.3.0 on all versions of the NVIDIA Container Toolkit up to 1.17.7 and NVIDIA GPU operators. GPU manufacturers deal with versions 1.17.8 and 25.3.1, respectively.

The NVIDIA Container Toolkit refers to a collection of libraries and utilities that allow users to build and run GPU-accelerated Docker containers. The NVIDIA GPU operator is designed to automatically deploy these containers to GPU nodes in a Kubernetes cluster.

Shared details of the flaw in Thursday’s analysis, Wiz said the drawback would affect 37% of the cloud environment, allowing attackers to access, steal or manipulate sensitive data and their own models from all other customers running on the same shared hardware through three lines of exploit.

The vulnerability is attributed to a misconception about how the toolkit handles the Open Container Initiative (OCI) Hook “CreateContainer”. A successful exploit for CVE-2025-23266 could result in a complete acquisition of the server. Wiz also characterized the flaw as “incredibly” easy to weaponize.

“By setting LD_PRELOAD to DockerFile, attackers can instruct NVIDIA-CTK hooks to load malicious libraries,” added Wiz researchers Nir Ohfeld and Shir Tamari.

“What’s worse, CreateContainer Hook runs using a working directory set up in the container’s root file system. This means that malicious libraries can be loaded directly from the container image with a simple path and completed the exploit chain.”

Cybersecurity

All of this can be achieved with a “surprisingly simple 3-line dockerfly” that loads the attacker’s shared object file into the privileged process.

This disclosure came months after Wiz detailed another vulnerability bypass in the NVIDIA Container Toolkit (CVE-2024-0132, CVSS score: 9.0 and CVE-2025-23359, CVSS score: 8.3) to achieve a full host takeover.

“High hype about AI security risks tends to focus on AI-based futuristic attacks, but vulnerabilities in the ever-growing “old-school” infrastructure of the AI technology stack continue to be an immediate threat that security teams should prioritize,” Wiz said.

“Furthermore, this study emphasizes that containers should not rely on as the only means of isolation, rather than as a strong security barrier. Especially when designing applications in multi-tenant environments, it is always necessary to implement at least one strong isolation barrier, such as virtualization, “assuming vulnerabilities.” ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHypersonic Flight’s new ESA test platform
Next Article CERT-UA uses LLM for Phishing Campaigns to discover Lamehug Malware linked to APT28

Related Posts

TrueConf zero-day exploited to attack Southeast Asian government networks

March 31, 2026

Vertex AI vulnerability exposes Google Cloud data and private artifacts

March 31, 2026

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

March 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TrueConf zero-day exploited to attack Southeast Asian government networks

Healthcare data giant CareCloud announces that hackers have accessed patient medical records

Rivian spinoff also plans to build autonomous delivery vehicles for DoorDash

Meta launches two new Ray-Ban glasses designed for prescription wearers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.