<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Nvidia — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/nvidia/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/nvidia/feed.xml" rel="self" type="application/rss+xml"/><item><title>NVIDIA KAI Scheduler Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-kai-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-kai-auth-bypass/</guid><description>CVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-24177 details a security flaw within the NVIDIA KAI Scheduler. This vulnerability stems from a lack of proper authentication mechanisms for critical API endpoints. An attacker exploiting this flaw could potentially bypass authorization checks and gain unauthorized access to sensitive functionalities. Successful exploitation leads to information disclosure. The affected product is NVIDIA KAI Scheduler. As of April 2026, exploitation in the wild has not been confirmed, but the potential impact warrants immediate attention from security teams. This vulnerability allows an attacker with network access to the KAI Scheduler to retrieve sensitive information without proper authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an exposed NVIDIA KAI Scheduler instance.</li>
<li>The attacker crafts a malicious HTTP request targeting an API endpoint lacking authentication (CWE-306).</li>
<li>The attacker sends the request to the KAI Scheduler.</li>
<li>Due to the missing authentication check, the KAI Scheduler processes the request without verifying the attacker&rsquo;s identity.</li>
<li>The KAI Scheduler returns sensitive information to the attacker.</li>
<li>The attacker analyzes the disclosed information for further exploitation.</li>
<li>The attacker uses the disclosed information to access other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24177 enables an attacker to bypass authentication and access sensitive information managed by the NVIDIA KAI Scheduler. The type of information exposed depends on the specific API endpoint accessed, and could include configuration data, user credentials, or internal system details. The NIST advisory assigns a CVSS v3.1 base score of 7.7 (HIGH), highlighting the significant risk of information disclosure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to NVIDIA KAI Scheduler API endpoints (webserver category, product linux/windows).</li>
<li>Inspect network traffic for unauthorized access to NVIDIA KAI Scheduler API endpoints (network_connection category).</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts against NVIDIA KAI Scheduler.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>vulnerability</category><category>authentication-bypass</category><category>nvidia</category></item><item><title>NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</link><pubDate>Tue, 21 Apr 2026 17:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</guid><description>NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.</description><content:encoded><![CDATA[<p>NVIDIA CUDA-Q contains a vulnerability identified as CVE-2026-24189 that allows an unauthenticated attacker to trigger an out-of-bounds read. This vulnerability exists in an unspecified endpoint of the CUDA-Q software. By sending a maliciously crafted request, an attacker can potentially read sensitive information from memory or cause a denial-of-service condition. This vulnerability has a CVSS v3.1 score of 8.2, indicating a high severity. Successful exploitation can lead to both information disclosure and service disruption, impacting the confidentiality and availability of systems running vulnerable versions of CUDA-Q. This is particularly concerning for systems processing sensitive data or providing critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CUDA-Q endpoint exposed over the network.</li>
<li>The attacker crafts a malicious request designed to trigger an out-of-bounds read. This likely involves manipulating request parameters to access memory outside of the intended buffer.</li>
<li>The attacker sends the malicious request to the vulnerable CUDA-Q endpoint.</li>
<li>The CUDA-Q software processes the request without proper bounds checking.</li>
<li>The software attempts to read memory outside of the allocated buffer, triggering an out-of-bounds read condition.</li>
<li>If the out-of-bounds read is successful, the attacker gains access to sensitive information stored in memory.</li>
<li>The attacker may cause a denial-of-service condition by triggering a crash or unexpected behavior due to the memory access violation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24189 can lead to a denial of service, rendering the CUDA-Q service unavailable. Additionally, the out-of-bounds read can expose sensitive information stored in memory, potentially leading to further compromise. The severity of the impact depends on the nature of the data accessible via the out-of-bounds read. Sectors relying on CUDA-Q for computationally intensive tasks are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting CUDA-Q endpoints to detect potential exploitation attempts (category: webserver, product: linux).</li>
<li>Apply any available patches or updates from NVIDIA to address the CVE-2026-24189 vulnerability.</li>
<li>Deploy the Sigma rule to detect suspicious HTTP requests (rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24189</category><category>out-of-bounds read</category><category>nvidia</category></item><item><title>NVIDIA Triton Inference Server Denial-of-Service Vulnerability (CVE-2026-24146)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-triton-dos/</link><pubDate>Tue, 07 Apr 2026 18:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-triton-dos/</guid><description>NVIDIA Triton Inference Server is vulnerable to denial of service due to insufficient input validation that, when combined with a large number of outputs, can cause a server crash.</description><content:encoded><![CDATA[<p>NVIDIA Triton Inference Server is susceptible to a denial-of-service (DoS) vulnerability identified as CVE-2026-24146. This flaw stems from insufficient input validation within the server software. An attacker can exploit this by sending specially crafted requests with a large number of expected outputs to the server. If successful, this causes excessive memory allocation leading to a server crash, rendering the service unavailable to legitimate users. This vulnerability impacts any organization utilizing affected versions of the NVIDIA Triton Inference Server. Publicly available information regarding affected versions is limited, but it is critical that organizations monitor for updates and apply necessary patches promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable NVIDIA Triton Inference Server instance.</li>
<li>The attacker crafts a malicious request designed to trigger excessive output generation.</li>
<li>The crafted request is sent to the Triton Inference Server via HTTP or gRPC.</li>
<li>The server receives the request and attempts to process it.</li>
<li>Due to insufficient input validation, the server allocates an excessive amount of memory.</li>
<li>Repeated requests exhaust available memory resources.</li>
<li>The server crashes due to an out-of-memory condition.</li>
<li>Legitimate users are unable to access the inference server, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24146 leads to a denial-of-service condition on the NVIDIA Triton Inference Server. This can disrupt AI inference workloads, potentially impacting critical applications that rely on these services. The impact is significant for organizations that depend on the availability of their AI models for real-time decision-making or other operational needs. The specific number of affected organizations is unknown, but any organization using a vulnerable version of the Triton Inference Server is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a non-vulnerable version of NVIDIA Triton Inference Server as soon as it is available from NVIDIA to remediate CVE-2026-24146.</li>
<li>Implement input validation on the server-side to prevent malicious requests with excessive output parameters; this is a general mitigation strategy since specific filters are unavailable.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Triton Inference Server Requests</code> to identify potential exploitation attempts targeting the vulnerability.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for unusual request patterns that may indicate exploitation attempts, focusing on cs-uri-query parameters related to output size or count.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24146</category><category>denial-of-service</category><category>nvidia</category><category>triton</category></item><item><title>NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-dali-deserialization/</link><pubDate>Tue, 07 Apr 2026 18:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-dali-deserialization/</guid><description>NVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-24156 describes a deserialization of untrusted data vulnerability within NVIDIA DALI. This vulnerability could allow an attacker to execute arbitrary code on a vulnerable system. According to NVIDIA&rsquo;s advisory, a successful exploit requires local access, a low level of privileges, and user interaction. The CVSS v3.1 score is rated as 7.3 (HIGH). The vulnerability was reported on April 7, 2026. Successful exploitation could allow an attacker to compromise the confidentiality, integrity, and availability of the system. This is a critical vulnerability for systems utilizing NVIDIA DALI, especially those processing external or untrusted data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a system running NVIDIA DALI, possibly through social engineering or physical access.</li>
<li>The attacker prepares a malicious serialized data object designed to exploit the deserialization vulnerability in DALI.</li>
<li>The attacker leverages user interaction to trigger the deserialization process within DALI, potentially through a crafted input file or command-line argument.</li>
<li>During deserialization, the malicious object executes arbitrary code due to the vulnerability.</li>
<li>The attacker gains control of the DALI process, potentially escalating privileges within the application context.</li>
<li>The attacker uses the compromised DALI process to execute commands on the host operating system.</li>
<li>The attacker compromises the system, potentially installing malware, exfiltrating sensitive data, or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24156 can lead to arbitrary code execution on systems running NVIDIA DALI. This could result in complete system compromise, including data theft, system corruption, and denial of service. Given the CVSS score of 7.3, the impact is considered high, as successful exploitation can severely impact confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the version of NVIDIA DALI that addresses CVE-2026-24156, as described in NVIDIA&rsquo;s advisory.</li>
<li>Implement least privilege principles to limit the impact of potential code execution.</li>
<li>Monitor systems for suspicious process execution originating from DALI processes to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24156</category><category>deserialization</category><category>nvidia</category><category>dali</category></item><item><title>NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-bionemo-deserialization/</link><pubDate>Tue, 31 Mar 2026 17:17:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-bionemo-deserialization/</guid><description>NVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.</description><content:encoded><![CDATA[<p>A deserialization of untrusted data vulnerability has been identified in NVIDIA BioNeMo (CVE-2026-24164). This vulnerability allows a malicious actor to potentially inject arbitrary code, trigger a denial-of-service condition, expose sensitive information, or tamper with data within the BioNeMo environment. The vulnerability stems from BioNeMo&rsquo;s processing of serialized data, which, if crafted maliciously, can lead to unintended code execution or system compromise. The reported CVSS v3.1 score is 8.8, indicating a high severity. The vendor, NVIDIA, has acknowledged the vulnerability, but specific exploitation details and affected versions are not available in the provided source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint or functionality within NVIDIA BioNeMo that accepts serialized data as input.</li>
<li>The attacker crafts a malicious serialized object designed to exploit the deserialization vulnerability. This object could contain instructions to execute arbitrary code, read sensitive files, or modify application data.</li>
<li>The attacker sends the malicious serialized object to the vulnerable BioNeMo endpoint. This could be done via a web request, API call, or other data submission mechanism.</li>
<li>BioNeMo attempts to deserialize the received data.</li>
<li>During the deserialization process, the malicious object triggers the execution of attacker-controlled code due to the vulnerability.</li>
<li>The attacker gains control of the BioNeMo application process or underlying server.</li>
<li>The attacker performs malicious actions such as exfiltrating sensitive data, installing malware, or disrupting services.</li>
<li>The attacker achieves their objective, which could include data breach, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24164 can have severe consequences. It could lead to the execution of arbitrary code on the BioNeMo server, allowing attackers to gain unauthorized access and control. Sensitive data processed by BioNeMo could be exposed, leading to a data breach. The vulnerability could also be exploited to cause a denial of service, disrupting BioNeMo&rsquo;s functionality. Data tampering is also a potential consequence, leading to data integrity issues and potentially impacting downstream processes that rely on BioNeMo. The number of potential victims and targeted sectors are unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests containing serialized data being sent to NVIDIA BioNeMo endpoints, and deploy the Sigma rule <code>Detect Suspicious BioNeMo Deserialization Attempts</code> to detect potential exploitation attempts.</li>
<li>Inspect network traffic for unusual data patterns related to serialization protocols and correlate with BioNeMo activity, to aid in identifying potential exploitation attempts targeting CVE-2026-24164.</li>
<li>Monitor process creation events on servers hosting NVIDIA BioNeMo for unexpected processes being spawned by the BioNeMo application, using the <code>Detect BioNeMo Child Process</code> Sigma rule to catch unexpected child processes.</li>
<li>Apply any available patches or updates released by NVIDIA to address CVE-2026-24164 as soon as they become available. Refer to NVIDIA&rsquo;s security advisory for remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>deserialization</category><category>nvidia</category></item><item><title>NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)</title><link>https://feed.craftedsignal.io/briefs/2026-03-nvidia-jetson-initrd-vuln/</link><pubDate>Tue, 31 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-nvidia-jetson-initrd-vuln/</guid><description>CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-24154 affects NVIDIA Jetson Linux and stems from a flaw within the initrd (initial RAM disk) process.  An unprivileged attacker with physical access to a vulnerable device can inject malicious command-line arguments during the boot process. This injection can subvert the intended system initialization, leading to a variety of severe consequences.  The vulnerability was published on March 31, 2026, and has a CVSS v3.1 score of 7.6. The affected versions of Jetson Linux are not specified in the source.  Successful exploitation allows attackers to execute arbitrary code, escalate privileges, cause denial of service, tamper with data, and disclose sensitive information. Defenders should focus on securing physical access and monitoring boot processes for unauthorized modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains physical access to the NVIDIA Jetson device.</li>
<li>Attacker interrupts the boot process to gain access to the bootloader. This may involve pressing specific keys during startup or utilizing hardware tools.</li>
<li>Attacker modifies the kernel command line arguments passed to the initrd. This is achieved by manipulating bootloader settings.</li>
<li>The modified command line arguments inject malicious commands or alter the execution path within the initrd environment.</li>
<li>During initrd execution, the injected commands are processed, leading to code execution within the early boot environment. This bypasses normal user authentication and security measures.</li>
<li>The attacker leverages the initial code execution to escalate privileges by exploiting vulnerabilities within the initrd environment or system binaries.</li>
<li>With escalated privileges, the attacker gains control over the system, enabling them to install persistent backdoors, tamper with system configurations, or exfiltrate sensitive data.</li>
<li>The final objective is achieved, which can range from complete system compromise and data theft to denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24154 can lead to a complete compromise of the NVIDIA Jetson Linux device. The attacker can achieve code execution, escalate privileges, and gain persistent access. This could result in data breaches, system instability, and the deployment of malicious software. While the number of potential victims and specific sectors targeted are not mentioned in the source, the vulnerability affects devices used in various embedded systems, robotics, and edge computing applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Restrict physical access to NVIDIA Jetson devices to prevent unauthorized manipulation of the boot process.</li>
<li>Monitor boot logs and system events for unusual command-line arguments or modifications to the initrd environment. Deploy the Sigma rule <code>Detect Modified Kernel Command Line</code> to identify suspicious boot activity.</li>
<li>Consider implementing secure boot mechanisms to prevent unauthorized modifications to the bootloader and kernel.</li>
<li>Investigate any unauthorized access attempts or physical tampering with Jetson devices.</li>
<li>Apply any available patches or updates from NVIDIA to mitigate the vulnerability when they become available via NVIDIA&rsquo;s customer support portal referenced in the advisory.</li>
<li>Monitor network connections originating from the device after boot for unexpected or malicious activity, using network connection logs, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24154</category><category>nvidia</category><category>jetson</category><category>initrd</category><category>command injection</category><category>privilege escalation</category></item></channel></rss>