CVE-2025-23347

7.8 HIGH

📋 TL;DR

NVIDIA Project G-Assist contains an incorrect default permissions vulnerability (CWE-276) that allows attackers to escalate privileges. This affects systems running vulnerable versions of NVIDIA Project G-Assist software. Successful exploitation could lead to code execution, data tampering, denial of service, or information disclosure.

💻 Affected Systems

Products:
  • NVIDIA Project G-Assist
Versions: Specific versions not detailed in references; check NVIDIA advisory for affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations; requires local access or ability to execute code on target system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling code execution, data theft/modification, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on affected systems, potentially leading to data access and further system exploitation.

🟢

If Mitigated

Limited impact with proper access controls and network segmentation, potentially only affecting isolated components.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to execute code; no public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific patched versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5703

Restart Required: Yes

Instructions:

1. Review NVIDIA advisory for affected versions
2. Download and install latest NVIDIA Project G-Assist update
3. Restart affected systems
4. Verify patch installation

🔧 Temporary Workarounds

Restrict Local Access

all

Limit user access to systems running NVIDIA Project G-Assist to reduce attack surface

Network Segmentation

all

Isolate systems running vulnerable software from critical network segments

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles
  • Monitor systems for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NVIDIA Project G-Assist version against advisory; review system permissions and access controls

Check Version:

Check NVIDIA Project G-Assist application settings or system documentation for version information

Verify Fix Applied:

Verify installed version matches patched version in NVIDIA advisory; test privilege escalation attempts

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access attempts to NVIDIA Project G-Assist components
  • Changes to system permissions

Network Indicators:

  • Unusual local network traffic to/from NVIDIA Project G-Assist systems

SIEM Query:

Search for privilege escalation events or unauthorized access to NVIDIA Project G-Assist processes

🔗 References

📤 Share & Export