Sunday, May 18, 2025
HomeAINVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse...

NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys

Published on

SIEM as a Service

Follow Us on Google News

Researchers have uncovered significant security vulnerabilities in NVIDIA Riva, a breakthrough AI speech technology platform used for transcription, voice assistants, and conversational AI.

The flaws, now formally recognized as CVE-2025-23242 and CVE-2025-23243, expose enterprise users to potential unauthorized access and resource theft.

These vulnerabilities stemmed from exposed API endpoints that operated without proper authentication safeguards, creating an expansive attack surface in cloud-deployed implementations.

- Advertisement - Google News

Security Researchers Identify Two CVEs in NVIDIA’s AI Platform

Security researchers discovered a pattern of exposed NVIDIA Riva API endpoints across multiple organizations deployed in cloud environments.

The vulnerabilities were disclosed through Trend Zero Day Initiativeâ„¢ (ZDI) and documented as ZDI-25-145 and ZDI-25-144.

The research identified 54 unique IP addresses with exposed NVIDIA Riva services, all belonging to various cloud service providers, highlighting the widespread nature of the security oversight.

These vulnerabilities would allow unauthorized users to access Riva services without payment, potentially using expensive hardware resources and paid API keys.

Exposed API Endpoints Create Significant Security Risks

The core issue stems from NVIDIA Riva’s default configuration, which exposes multiple ports from the container to the host, listening on all IP addresses (0.0.0.0).

This network setting is equivalent to the docker –network host parameter and, without proper firewall settings, makes the service accessible to everyone.

Furthermore, even when TLS/SSL certificates are implemented, the gRPC server only encrypts traffic between client and server without verifying client identity, creating a false sense of security.

The problem is compounded by additional exposed ports that allow access to the underlying Triton Inference Server, which can be directly targeted, bypassing any security controls implemented at the Riva server level.

Key risks associated with these exposures include:

  • Unauthorized access to expensive GPU resources and paid API keys.
  • Increased risk of data leakage and intellectual property theft, especially for organizations running proprietary AI models.
  • Susceptibility to denial-of-service (DoS) and memory attacks against the Triton Inference Server.
  • Potential disclosure of underlying service information, making systems easier targets for attackers.

Organizations using NVIDIA Riva are advised to implement several security measures to reduce risk:

  • Deploy a secure API gateway to control access to gRPC or REST API endpoints.
  • Apply network segmentation to restrict access to trusted networks only.
  • Enforce strong authentication mechanisms and role-based access control, following zero-trust approaches.
  • Review container settings to disable unnecessary services, remove unused ports, and restrict privileged execution.
  • Enable comprehensive logging and monitoring to detect unusual access patterns or abuse.
  • Implement rate limiting and request throttling, particularly for externally exposed endpoints.
  • Keep all components of the Riva framework and Triton Inference Server up to date to mitigate known vulnerabilities.
  • Use tools like Trend Vision One Cloud Risk Management to proactively detect and prevent insecure default settings.

The discovery of these vulnerabilities highlights the critical need for robust security practices when deploying advanced AI systems.

As organizations rapidly adopt powerful speech recognition technologies, overlooking security configurations can lead to unauthorized access and potential service abuse, putting sensitive data and resources at risk.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...