EUVD-2025-19044

| CVE-2025-23265 HIGH
2025-06-24 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19044
CVE Published
Jun 24, 2025 - 16:15 nvd
HIGH 7.8

Description

NVIDIA Megatron-LM for all platforms contains a vulnerability in a python component where an attacker may cause a code injection issue by providing a malicious file. A successful exploit of this vulnerability may lead to Code Execution, Escalation of Privileges, Information Disclosure and Data Tampering.

Analysis

CVE-2025-23265 is a code injection vulnerability in NVIDIA Megatron-LM's Python component that allows local attackers with low privileges to execute arbitrary code by providing a malicious file. Successful exploitation enables code execution, privilege escalation, information disclosure, and data tampering. This vulnerability affects all platforms running Megatron-LM and poses significant risk to machine learning infrastructure, particularly in multi-tenant or shared compute environments.

Technical Context

NVIDIA Megatron-LM is a large-scale language model training framework that processes Python files and configurations during model initialization and execution. The vulnerability resides in a Python component (likely related to configuration loading, model serialization, or dynamic code execution) and is classified as CWE-94 (Improper Control of Generation of Code), indicating unsafe deserialization, eval-like functions, or dynamic code generation from untrusted input. The vulnerability stems from insufficient validation of file contents before processing, allowing attackers to inject arbitrary Python code through crafted files that are subsequently executed within the Megatron-LM process context. This affects all platform variants (Linux, cloud deployments, on-premises installations) where Megatron-LM is deployed.

Affected Products

NVIDIA Megatron-LM for all platforms and versions. The vulnerability description does not specify version ranges, indicating either all released versions are affected or the vendor has not yet published version-specific CVE metadata. CPE would be: cpe:2.7:a:nvidia:megatron-lm:*:*:*:*:*:*:*:*. Affected configurations include: (1) Megatron-LM installed on Linux clusters (x86_64, ARM), (2) Deployments in cloud environments (AWS, Azure, GCP with GPU support), (3) Multi-user HPC centers, (4) On-premises enterprise ML infrastructure. No specific version exemptions are documented in the CVE description.

Remediation

Immediate actions: (1) Consult NVIDIA security advisory (referenced in CVE documentation) for patched versions—apply patches prioritizing production ML training clusters; (2) Implement file access controls restricting which users can provide configuration/model files to Megatron-LM processes; (3) Run Megatron-LM processes with minimal required privileges (non-root service account with restricted file system access); (4) Validate and sanitize all external file inputs before processing—implement file format verification and signatures; (5) Use containerization (Docker/Kubernetes) with read-only file systems and network policies to limit blast radius. Longer-term: (1) Update to patched Megatron-LM versions once available from NVIDIA; (2) Implement input validation in upstream code for all file handling operations; (3) Replace dynamic code execution patterns (if applicable) with safe alternatives; (4) Deploy runtime monitoring to detect suspicious Python code execution patterns.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

EUVD-2025-19044 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy