CVE-2025-23279

7.0 HIGH

📋 TL;DR

A race condition vulnerability in NVIDIA .run installers for Linux and Solaris allows local attackers to escalate privileges. This affects systems where NVIDIA drivers or software are installed using the vulnerable installer. Attackers could potentially gain root access on affected systems.

💻 Affected Systems

Products:
  • NVIDIA .run installer for Linux and Solaris
Versions: All versions prior to patched release
Operating Systems: Linux, Solaris
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where NVIDIA software is installed using the .run installer method. Package manager installations (apt, yum) are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, allowing complete control over the system, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local privilege escalation to root, enabling installation of malware, data access, and system configuration changes.

🟢

If Mitigated

Limited impact with proper privilege separation and minimal user access, though local users could still escalate.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user on affected systems could potentially exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and race condition timing, making exploitation somewhat challenging but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific fixed versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5670

Restart Required: No

Instructions:

1. Visit NVIDIA driver download page. 2. Download latest .run installer. 3. Stop affected services. 4. Run installer with appropriate flags. 5. Verify installation.

🔧 Temporary Workarounds

Use package manager installation

linux

Install NVIDIA drivers via system package manager instead of .run installer

sudo apt install nvidia-driver-xxx
sudo yum install nvidia-driver-xxx

Restrict installer permissions

linux

Limit who can execute .run installers and monitor for suspicious activity

sudo chmod 750 /path/to/installer.run
sudo auditctl -w /path/to/installer.run -p x -k nvidia_install

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to affected systems
  • Monitor for privilege escalation attempts and unusual root activity

🔍 How to Verify

Check if Vulnerable:

Check if NVIDIA software was installed using .run installer method and review version against advisory

Check Version:

nvidia-smi --query-gpu=driver_version --format=csv,noheader

Verify Fix Applied:

Verify installed NVIDIA driver version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid executions of .run installer
  • Unexpected privilege escalation events
  • Suspicious process creation from installer

Network Indicators:

  • None - local exploit only

SIEM Query:

Process creation where parent process contains 'run' AND (privilege escalation OR user context change)

🔗 References

📤 Share & Export