CVE-2025-33179

8.0 HIGH

📋 TL;DR

This vulnerability in NVIDIA Cumulus Linux and NVOS allows low-privileged users to execute unauthorized commands through the NVUE interface, potentially leading to privilege escalation. It affects organizations using these networking products with the vulnerable configuration enabled. The vulnerability stems from improper privilege management (CWE-266).

💻 Affected Systems

Products:
  • NVIDIA Cumulus Linux
  • NVIDIA NVOS
Versions: Cumulus Linux 5.0.0 through 5.9.0, NVOS 10.5.0 through 10.7.0
Operating Systems: Linux-based network OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires NVUE interface to be enabled and accessible to low-privileged users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with low-privileged access could gain full administrative control over the network device, potentially compromising the entire network infrastructure.

🟠

Likely Case

Malicious insiders or compromised low-privileged accounts could escalate privileges to modify network configurations, intercept traffic, or disrupt network operations.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to the affected device only.

🌐 Internet-Facing: LOW - NVUE interface is typically not exposed to the internet in standard configurations.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this vulnerability to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing low-privileged access to the NVUE interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cumulus Linux 5.9.1+, NVOS 10.7.1+

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5722

Restart Required: Yes

Instructions:

1. Download the latest patch from NVIDIA support portal. 2. Backup current configuration. 3. Apply the patch using standard upgrade procedures. 4. Reboot the device. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Disable NVUE Interface

linux

Disable the NVUE interface if not required for operations

nv set service nvue disable
nv config apply

Restrict NVUE Access

linux

Limit NVUE interface access to administrative users only

configure user access controls via TACACS+/RADIUS or local user management

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Enforce principle of least privilege and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check current version: nv version | grep -E 'Cumulus|NVOS'

Check Version:

nv version

Verify Fix Applied:

Verify version is 5.9.1+ for Cumulus Linux or 10.7.1+ for NVOS

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized command execution attempts in NVUE logs
  • Privilege escalation patterns in system logs

Network Indicators:

  • Unusual administrative traffic from non-admin IP addresses

SIEM Query:

source="nvue" AND (event="command_execution" OR event="privilege_change") AND user!="admin"

🔗 References

📤 Share & Export