Cyber Posture

CVE-2025-23242

High

Published: 11 March 2025

Published
11 March 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 20.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-23242 is an improper access control vulnerability (CWE-284) in NVIDIA Riva. The issue allows a user to bypass access controls, potentially leading to escalation of privileges, data tampering, denial of service, or information disclosure. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low attack complexity.

Attackers with network access to a vulnerable NVIDIA Riva instance can exploit this without requiring privileges or user interaction. Successful exploitation could enable privilege escalation on the system, arbitrary data tampering affecting integrity, denial of service impacting availability, or unauthorized disclosure of sensitive information.

NVIDIA has published a security advisory with mitigation guidance at https://nvidia.custhelp.com/app/answers/detail/a_id/5625. Security practitioners should consult this bulletin for details on patches, workarounds, or configuration changes to address the vulnerability.

Details

CWE(s)
CWE-284NVD-CWE-noinfo

Affected Products

nvidia
riva
≤ 2.19.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Network-accessible improper access control vulnerability with no auth required directly enables exploitation of public-facing applications (T1190) and can be used for privilege escalation (T1068) as explicitly described in the impacts.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References