EUVD-2025-208968

| CVE-2025-33238 HIGH
2026-03-24 nvidia GHSA-5pqx-p8mp-cxrf
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 24, 2026 - 20:31 vuln.today
EUVD ID Assigned
Mar 24, 2026 - 20:31 euvd
EUVD-2025-208968
CVE Published
Mar 24, 2026 - 20:25 nvd
HIGH 7.5

Description

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

Analysis

NVIDIA Triton Inference Server's Sagemaker HTTP server contains a race condition vulnerability that allows unauthenticated remote attackers to trigger an exception, resulting in denial of service. The vulnerability affects NVIDIA Triton Inference Server deployments using the Sagemaker HTTP server component and can be exploited over the network without authentication or user interaction. There is no indication of active exploitation (not in CISA KEV), and EPSS data was not provided, but the CVSS score of 7.5 (High) reflects the ease of exploitation.

Technical Context

NVIDIA Triton Inference Server is an open-source inference serving software that enables deployment of AI models at scale. The vulnerable component is the Sagemaker HTTP server, which provides an HTTP interface compatible with AWS SageMaker for model inference requests. The root cause is CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization, also known as a Race Condition), indicating that multiple threads or processes access shared resources without proper locking mechanisms, leading to undefined behavior and exceptions. The affected product CPE is cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:* with the wildcard version indicating multiple versions are vulnerable pending specific version guidance from NVIDIA's advisory.

Affected Products

NVIDIA Triton Inference Server versions utilizing the Sagemaker HTTP server component are affected, as identified by CPE cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*. The wildcard version field indicates multiple versions are vulnerable, with specific version ranges detailed in NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5790. Organizations should consult the official NVIDIA advisory for precise version information and confirmation of their deployment's vulnerability status.

Remediation

Consult NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5790 for specific patch versions and upgrade instructions to remediate this race condition in the Sagemaker HTTP server component. Organizations should prioritize upgrading internet-facing Triton Inference Server instances to the patched version as soon as possible. As interim mitigation until patching is complete, restrict network access to the Sagemaker HTTP server endpoint using firewall rules or network segmentation to allow only trusted IP ranges, implement rate limiting to reduce the window for race condition exploitation, and monitor server logs for unusual exception patterns or service crashes that may indicate exploitation attempts.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-208968 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy