Sunday, May 18, 2025
HomeCyber Security NewsNVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

Published on

SIEM as a Service

Follow Us on Google News

NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in its popular TensorRT-LLM framework, urging all users to update to the latest version (0.18.2) to safeguard their systems against potential attacks.

Overview of the Vulnerability

The vulnerability, identified as CVE-2025-23254, affects all versions of the NVIDIA TensorRT-LLM framework before 0.18.2 across Windows, Linux, and macOS platforms.

CVE IDAffected PlatformsAffected VersionsUpdated VersionSeverityPotential Impact
CVE-2025-23254Windows, Linux, macOSAll < 0.18.20.18.2High (8.8)Code execution, info disclosure, data tampering

The flaw resides in the Python executor component of TensorRT-LLM, specifically in its handling of Inter-Process Communication (IPC) where the Python pickle module is utilized for serialization and deserialization.

- Advertisement - Google News

This process, if improperly secured, can open the door for attackers with local access to execute arbitrary malicious code, tamper with data, or extract sensitive information.

The vulnerability scores a high 8.8 out of 10 on the Common Vulnerability Scoring System (CVSS v3.1), marking it as a high-severity threat.

The underlying technical risk is categorized under CWE‑502, which refers to “Deserialization of Untrusted Data.”

NVIDIA has responded by releasing a security update that enables HMAC (Hash-Based Message Authentication Code) encryption by default for the IPC channel in both main and release branches of TensorRT-LLM.

This enhancement ensures that all serialized communications are encrypted and authenticated, preventing unauthorized code execution.

While users can manually disable this feature by modifying source code parameters (setting use_hmac_encryption = False in the relevant Python files), NVIDIA strongly advises against it, as doing so reintroduces the vulnerability.

To stay protected:

  • Update immediately to TensorRT-LLM version 0.18.2 or later from the official GitHub release page.
  • If using earlier software branches, upgrade to the latest supported release.

The vulnerability was responsibly reported by Avi Lumelsky of Oligo Security. NVIDIA encourages users to visit the Product Security page for the latest security bulletins, updates, and to subscribe for notifications.

This security issue is critical for any organization or individuals deploying NVIDIA’s TensorRT-LLM framework in production or research environments. 

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...