Facefam ArticlesFacefam Articles
  • webmaster
    • How to
    • Developers
    • Hosting
    • monetization
    • Reports
  • Technology
    • Software
  • Downloads
    • Windows
    • android
    • PHP Scripts
    • CMS
  • REVIEWS
  • Donate
  • Join Facefam
Search

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • November 2024

Categories

  • Advertiser
  • AI
  • android
  • betting
  • Bongo
  • Business
  • CMS
  • cryptocurrency
  • Developers
  • Development
  • Downloads
  • Entertainment
  • Entrepreneur
  • Finacial
  • General
  • Hosting
  • How to
  • insuarance
  • Internet
  • Kenya
  • monetization
  • Music
  • News
  • Phones
  • PHP Scripts
  • Reports
  • REVIEWS
  • RUSSIA
  • Software
  • Technology
  • Tips
  • Tragic
  • Ukraine
  • Uncategorized
  • USA
  • webmaster
  • webmaster
  • Windows
  • Women Empowerment
  • Wordpress
  • Wp Plugins
  • Wp themes
Facefam 2025
Notification Show More
Font ResizerAa
Facefam ArticlesFacefam Articles
Font ResizerAa
  • Submit a Post
  • Donate
  • Join Facefam social
Search
  • webmaster
    • How to
    • Developers
    • Hosting
    • monetization
    • Reports
  • Technology
    • Software
  • Downloads
    • Windows
    • android
    • PHP Scripts
    • CMS
  • REVIEWS
  • Donate
  • Join Facefam
Have an existing account? Sign In
Follow US
Technologywebmaster

NVIDIA Vulnerabilities Could Let Attackers Hijack AI Inference Servers

Ronald Kenyatta
Last updated: August 6, 2025 5:32 am
By
Ronald Kenyatta
ByRonald Kenyatta
Follow:
Share
4 Min Read
SHARE

Contents
How does the attack chain work?AI infrastructure offers an expanding attack surface
The NVIDIA logo and symbol displayed on the facade of one of their office buildings located in the Company's campus in Silicon Valley.
Image: Sundry Photography/Adobe Stock

An attack chain in NVIDIA’s Triton Inference Server that could allow remote attackers to gain full control has now been patched. It consisted of three vulnerabilities that allowed unauthorised users to obtain the Inter-Process Communication (IPC) memory key and use it to craft malicious inference requests.

Triton is an open-source software product that lets users run and manage multiple artificial intelligence models from different frameworks simultaneously on CPUs or GPUs. It routes inference requests, where a trained AI model is asked to make predictions or generate outputs based on unseen input data, to the correct model. In the hands of an attacker, such requests could provide complete control of the server.

Wiz researchers, who discovered the vulnerabilities and disclosed them to NVIDIA in May, wrote in their technical overview: “This poses a critical risk to organizations using Triton for AI/ML, as a successful attack could lead to the theft of valuable AI models, exposure of sensitive data, manipulating the AI model’s responses and a foothold for attackers to move deeper into a network.”

The three vulnerabilities that allow the attack chain have been named CVE-2025-23319, CVE-2025-23320, and CVE-2025-23334, and all are present in Triton Inference Server versions prior to 25.07. NVIDIA recommends that all users install the latest update from the Triton Inference Server Releases page on GitHub, which also patches 14 other vulnerabilities.

How does the attack chain work?

  1. The attacker starts by finding a publicly exposed Triton Inference Server instance through a simple internet search. They then send a large, specially crafted request to the server, which triggers an error message. The error message contains the full, unique name of the backend’s internal IPC shared memory region, something that should remain private.
  2. Next, they use this name to access a Triton feature that allows users to read from and write data in that named shared memory region. The intention of this feature is to allow authorised users to pass data to models more efficiently and speed up inference. Unfortunately, Triton does not validate whether the shared memory region actually belongs to the user requesting access to it or if it is a private region that no one should access.
  3. The attacker then crafts inference requests using the shared memory region and that gives them full control of the server. For example, a request could include a malicious IPC message that tricks the server into loading malicious AI models or bypassing security checks.

AI infrastructure offers an expanding attack surface

NVIDIA has recently had to address a number of vulnerabilities in its popular ecosystem of AI infrastructure. Just last month, it patched another flaw found by Wiz that could allow attackers to escape container boundaries in the NVIDIA Container Toolkit and gain full root access to the host machine.

These serve as a reminder that, as AI continues to be embedded into critical workflows, security teams must not overlook the expanding attack surface of the infrastructure that supports it.

China is investigating NVIDIA over claims that its H20 AI chips could secretly track users or be shut down remotely — a sharp blow just weeks after US export restrictions were eased.

TAGGED:AttackersHijackInferencenvidiaserversVulnerabilities
Share This Article
Facebook Whatsapp Whatsapp Email Copy Link Print
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ISC2 AI Certificate Offers Upskilling for Cybersecurity Pros ISC2 AI Certificate Offers Upskilling for Cybersecurity Pros
Next Article AI Beats Hackers to a Zero-Day Cybersecurity Discovery, Twice AI Beats Hackers to a Zero-Day Cybersecurity Discovery, Twice
Leave a review

Leave a Review Cancel reply

Your email address will not be published. Required fields are marked *

Please select a rating!

Meta Strikes $10 Billion Cloud Deal With Google to Boost AI Capacity
NVIDIA CEO Dismisses Chip Security Allegations as China Orders Firms to Halt Purchases
Anthropic Folds Claude Code Into Business Plans With Governance Tools
Google Claims One Gemini AI Prompt Uses Five Drops of Water
Generate AI Business Infographics without the Fees

Recent Posts

  • Meta Strikes $10 Billion Cloud Deal With Google to Boost AI Capacity
  • NVIDIA CEO Dismisses Chip Security Allegations as China Orders Firms to Halt Purchases
  • Anthropic Folds Claude Code Into Business Plans With Governance Tools
  • Google Claims One Gemini AI Prompt Uses Five Drops of Water
  • Generate AI Business Infographics without the Fees

Recent Comments

  1. https://tubemp4.ru on Best Features of PHPFox Social Network Script
  2. Вулкан Платинум on Best Features of PHPFox Social Network Script
  3. Вулкан Платинум официальный on Best Features of PHPFox Social Network Script
  4. Best Quality SEO Backlinks on DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns
  5. http://boyarka-inform.com on Comparing Wowonder and ShaunSocial

You Might Also Like

IT Leader’s Guide to the Metaverse

August 21, 2025
State of AI Adoption in Financial Services: A TechRepublic Exclusive
Technologywebmaster

State of AI Adoption in Financial Services: A TechRepublic Exclusive

August 21, 2025
AI Underperforms in Reality, and the Stock Market is Feeling It
Technologywebmaster

AI Underperforms in Reality, and the Stock Market is Feeling It

August 21, 2025
Google Shows Off Pixel 10 Series and Pixel Watch 4
Technologywebmaster

Google Shows Off Pixel 10 Series and Pixel Watch 4

August 21, 2025
NVIDIA & NSF to Build Fully Open AI Models for Science
Technologywebmaster

NVIDIA & NSF to Build Fully Open AI Models for Science

August 20, 2025
Previous Next
Facefam ArticlesFacefam Articles
Facefam Articles 2025
  • Submit a Post
  • Donate
  • Join Facefam social
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up