Cyber Posture

CVE-2025-23243

Medium

Published: 11 March 2025

Published
11 March 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
EPSS Score 0.0009 25.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-23243 is an improper access control vulnerability (CWE-284) in NVIDIA Riva, published on 2025-03-11. The issue allows a user to potentially cause data tampering or denial of service upon successful exploitation. It has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L), rated as medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and unchanged scope.

An unauthenticated attacker with network access can exploit this vulnerability remotely. Exploitation requires low complexity and no user interaction, potentially leading to limited integrity impacts such as data tampering or limited availability impacts resulting in denial of service, with no confidentiality impacts.

The NVIDIA security advisory provides details on mitigation and patches at https://nvidia.custhelp.com/app/answers/detail/a_id/5625.

Details

CWE(s)
CWE-284NVD-CWE-noinfo

Affected Products

nvidia
riva
≤ 2.19.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remotely exploitable improper access control vulnerability in the network-accessible NVIDIA Riva service, allowing unauthenticated attackers to cause data tampering or denial of service with no privileges or user interaction required, directly mapping to exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References