Cyber Posture

CVE-2025-33213

High

Published: 09 December 2025

Published
09 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

NVIDIA Merlin Transformers4Rec for Linux contains a vulnerability in the Trainer component, where a user could cause a deserialization issue. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the deserialization vulnerability in the Trainer component by identifying, reporting, and patching the specific flaw.

prevent

Enforces validation of information inputs to the Trainer component, preventing exploitation via unsafe deserialization of untrusted user-supplied data.

prevent

Provides memory protections that mitigate arbitrary code execution, denial of service, and data tampering impacts from successful deserialization exploits.

Security SummaryAI

CVE-2025-33213 is a deserialization vulnerability (CWE-502) in the Trainer component of NVIDIA Merlin Transformers4Rec for Linux. Published on 2025-12-09T18:15:49.447, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The issue allows a user to trigger a deserialization problem, which could potentially result in code execution, denial of service, information disclosure, and data tampering.

An attacker can exploit this vulnerability remotely over the network with low attack complexity and no required privileges, though user interaction is necessary. Successful exploitation enables high-impact effects on confidentiality, integrity, and availability, such as arbitrary code execution, service disruption, exposure of sensitive data, and manipulation of information within the affected Trainer component.

Mitigation details are available in official advisories, including NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5739, the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-33213, and the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-33213. Security practitioners should consult these sources for patch information and recommended remediation steps.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Deserialization vulnerability (CWE-502) enables remote code execution with user interaction (T1203: Exploitation for Client Execution) and denial of service (T1499.004: Application or System Exploitation) in the Trainer component.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References