CVE-2025-23297

7.8 HIGH

📋 TL;DR

This vulnerability in NVIDIA's FrameviewSDK installer for Windows allows local unprivileged attackers to modify files in the Frameview SDK directory, potentially leading to privilege escalation. It affects users of NVIDIA's NvAPP software on Windows systems. The attacker needs local access to the system to exploit this weakness.

💻 Affected Systems

Products:
  • NVIDIA NvAPP with FrameviewSDK
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations where NVIDIA NvAPP with FrameviewSDK is installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative privileges on the system, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local privilege escalation allowing an attacker to execute code with higher privileges than their current account.

🟢

If Mitigated

No impact if proper access controls prevent local attackers from accessing the vulnerable directory.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Internal attackers with local access could exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system and knowledge of the vulnerable directory structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest NVIDIA NvAPP version as specified in NVIDIA advisory

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5682

Restart Required: Yes

Instructions:

1. Visit NVIDIA's support page for the advisory
2. Download the latest version of NVIDIA NvAPP
3. Run the installer to update the software
4. Restart the system as prompted

🔧 Temporary Workarounds

Restrict FrameviewSDK directory permissions

windows

Set strict permissions on the FrameviewSDK installation directory to prevent unauthorized modifications

icacls "C:\Program Files\NVIDIA Corporation\FrameviewSDK" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(WD,AD,WEA,WA)"

🧯 If You Can't Patch

  • Implement strict access controls on the FrameviewSDK directory to prevent unauthorized modifications
  • Monitor for suspicious file modifications in the FrameviewSDK directory using file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check if NVIDIA NvAPP with FrameviewSDK is installed and verify the version against NVIDIA's advisory

Check Version:

Check NVIDIA Control Panel or installed programs list for NVIDIA NvAPP version

Verify Fix Applied:

Verify the NVIDIA NvAPP version is updated to the patched version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications in FrameviewSDK directory
  • Processes attempting to write to FrameviewSDK directory from non-privileged accounts

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

EventID=4663 AND ObjectName LIKE '%FrameviewSDK%' AND SubjectUserName NOT IN ('SYSTEM', 'Administrators')

🔗 References

📤 Share & Export