NVIDIA KAI Scheduler CVE-2026-24177

| EUVD-2026-24147 HIGH
Missing Authentication for Critical Function (CWE-306)
2026-04-21 nvidia GHSA-h643-x86r-86v6
7.7
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Re-analysis Queued
Apr 21, 2026 - 17:22 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 17:00 vuln.today

DescriptionNVD

NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization. A successful exploit of this vulnerability might lead to information disclosure.

AnalysisAI

Authorization bypass in NVIDIA KAI Scheduler allows authenticated network attackers to access protected API endpoints and disclose sensitive information across security boundaries. The vulnerability (CWE-306: Missing Authentication for Critical Function) enables low-privileged authenticated users to read high-value data outside their intended scope (CVSS scope changed to 'C', high confidentiality impact). …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all NVIDIA KAI Scheduler deployments and document current user privilege assignments; notify NVIDIA account team and retrieve advisory 5818 remediation guidance. Within 7 days: Implement network segmentation and API access controls per NVIDIA advisory 5818; apply any available configuration hardening recommendations. …

Sign in for detailed remediation steps.

Share

CVE-2026-24177 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy