CVE-2025-33213
Published: 09 December 2025
Description
NVIDIA Merlin Transformers4Rec for Linux contains a vulnerability in the Trainer component, where a user could cause a deserialization issue. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the deserialization vulnerability in the Trainer component by identifying, reporting, and patching the specific flaw.
Enforces validation of information inputs to the Trainer component, preventing exploitation via unsafe deserialization of untrusted user-supplied data.
Provides memory protections that mitigate arbitrary code execution, denial of service, and data tampering impacts from successful deserialization exploits.
Security SummaryAI
CVE-2025-33213 is a deserialization vulnerability (CWE-502) in the Trainer component of NVIDIA Merlin Transformers4Rec for Linux. Published on 2025-12-09T18:15:49.447, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The issue allows a user to trigger a deserialization problem, which could potentially result in code execution, denial of service, information disclosure, and data tampering.
An attacker can exploit this vulnerability remotely over the network with low attack complexity and no required privileges, though user interaction is necessary. Successful exploitation enables high-impact effects on confidentiality, integrity, and availability, such as arbitrary code execution, service disruption, exposure of sensitive data, and manipulation of information within the affected Trainer component.
Mitigation details are available in official advisories, including NVIDIA's security bulletin at https://nvidia.custhelp.com/app/answers/detail/a_id/5739, the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-33213, and the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-33213. Security practitioners should consult these sources for patch information and recommended remediation steps.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization vulnerability (CWE-502) enables remote code execution with user interaction (T1203: Exploitation for Client Execution) and denial of service (T1499.004: Application or System Exploitation) in the Trainer component.