CVE-2025-23258

7.3 HIGH

📋 TL;DR

This vulnerability in NVIDIA DOCA's collectx-dpeserver package for ARM64 systems allows local attackers with low privileges to escalate to root privileges. It affects systems running the vulnerable Debian package on ARM64 architecture. Successful exploitation gives attackers complete system control.

💻 Affected Systems

Products:
  • NVIDIA DOCA collectx-dpeserver Debian package
Versions: Specific versions not detailed in references; check NVIDIA advisory for exact affected versions
Operating Systems: Linux (Debian-based ARM64 systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ARM64 architecture; x86_64 systems not vulnerable

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local user or compromised low-privilege service escalates to root, allowing installation of malware, credential harvesting, and system manipulation.

🟢

If Mitigated

With proper privilege separation and minimal user access, impact limited to isolated containers or restricted environments.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access with low privileges; no authentication bypass needed beyond initial low-privilege access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific fixed version

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5655

Restart Required: Yes

Instructions:

1. Check NVIDIA advisory for exact affected/fixed versions
2. Update collectx-dpeserver package via apt: sudo apt update && sudo apt upgrade collectx-dpeserver
3. Restart affected services or reboot system

🔧 Temporary Workarounds

Remove vulnerable package

linux

Uninstall collectx-dpeserver if not required

sudo apt remove collectx-dpeserver

Restrict package execution

linux

Use filesystem permissions to prevent execution

sudo chmod 000 /usr/bin/collectx-dpeserver

🧯 If You Can't Patch

  • Implement strict privilege separation and least privilege access controls
  • Monitor for privilege escalation attempts using auditd or similar tools

🔍 How to Verify

Check if Vulnerable:

Check installed version: dpkg -l | grep collectx-dpeserver

Check Version:

dpkg -l | grep collectx-dpeserver

Verify Fix Applied:

Verify package is updated to non-vulnerable version per NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation attempts
  • collectx-dpeserver process spawning with elevated privileges
  • Audit logs showing setuid/setgid operations

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

process.name:"collectx-dpeserver" AND user.id:0

🔗 References

📤 Share & Export