CVE-2025-33251
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this flaw, the attacker needs access to the affected system, making it crucial for users to secure their environments.
Technical Description
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 20, 2026
about 2 months ago
Vendor
nvidia
Product
nemo
Related Vulnerabilities
An attacker can execute their own code on a user's system by tricking them into opening a specially crafted file in the NVIDIA NeMo Framework. This requires the user to be convinced to load the malicious file, which could lead to serious issues like crashing the system, leaking sensitive information, or altering data.
This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this, the attacker needs to have access to the affected system, making it crucial for users to secure their environments.
This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this flaw, the attacker would need access to the affected system, making it crucial for administrators to secure their environments.
This vulnerability allows an attacker to run harmful code on systems using the NVIDIA NeMo Framework by sending specially crafted input through a voice-preprocessing script. If successful, this could lead to unauthorized access, data leaks, or even altering important information, but it requires the attacker to have the ability to submit malicious input to the system.
This vulnerability allows an attacker to execute malicious commands on a system using the NVIDIA NeMo Framework by providing specially crafted input to a configuration setting. To exploit this, the attacker needs access to the ASR Evaluator utility, which could lead to unauthorized actions like altering data or gaining higher privileges.