New NVIDIA Triton AI Server Bugs Allow Full Remote System Takeover

Critical Security Flaws in NVIDIA Triton Inference Server Allow Remote Takeover of AI Systems

  • Researchers disclosed serious security issues in the NVIDIA Triton Inference Server used for AI models.
  • The vulnerabilities could allow attackers to take full control of servers remotely and without credentials.
  • Three flaws in the server’s Python backend could be chained for remote code execution or data theft.
  • NVIDIA fixed the issues in version 25.07 and addressed three additional critical bugs.
  • There are no reports of attacks so far, but users are urged to update for protection.

A set of security flaws was recently found in the NVIDIA Triton Inference Server, an open-source platform that runs Artificial Intelligence (AI) models at scale on Windows and Linux. According to researchers at Wiz, these problems could let a remote attacker take over a vulnerable server, gaining full control without needing to log in.

- Advertisement -

The three main vulnerabilities, identified as CVE-2025-23319 (CVSS 8.1), CVE-2025-23320 (CVSS 7.5), and CVE-2025-23334 (CVSS 5.9), affect the Triton server’s Python backend. One flaw allows out-of-bounds writing, another can exceed the server’s memory limits, and the third enables reading out-of-bounds memory. Together, these issues could result in attackers executing their own code, denying service, or stealing information.

“When chained together, these flaws can potentially allow a remote, unauthenticated attacker to gain complete control of the server, achieving remote code execution (RCE),” explained Wiz’s Ronen Shustin and Nir Ohfeld in their report.

The vulnerabilities are rooted in how the Python backend handles requests for AI models from frameworks like PyTorch and TensorFlow. Attackers could use one weakness to leak the server’s private memory region name, then apply the other flaws to take over the system. This risk includes theft of AI models, exposure of sensitive data, or changing the results that AI models generate.

In its August security bulletin, NVIDIA also addressed three additional issues: CVE-2025-23310, CVE-2025-23311, and CVE-2025-23317. These could let attackers execute their own code, cause denial of service, expose information, or tamper with data if left patched.

- Advertisement -

There is no current evidence of these vulnerabilities being used in real attacks. Users of the Triton Inference Server are advised to update to version 25.07 or later for full protection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Aave v4 and Lido v3 Spark Major DeFi Upgrades, 2026 Outlook!

Major DeFi protocols plan substantive upgrades in early 2026.Aave is preparing a new architecture...

Hyperliquid Unlock Dilutes HYPE Holders by $331M amid $268M+

Hyperliquid unlocked 12,457,813 HYPE tokens from a founding vesting allocation, increasing circulating supply by...

Quintenz Joins SUI Group Board to Guide $200M Treasury Plan.

Brian Quintenz has been appointed to the board of Sui Group.The appointment aims to...

AMD Unveils Helios AI Rack to Challenge Nvidia’s Lead at CES

AMD CEO Lisa Su unveiled new AI chips and the Helios AI data center...

PepsiCo, Siemens and NVIDIA Deploy AI Digital Twins to Scale

PepsiCo has formed a partnership with Siemens and NVIDIA to use digital twin technology...
- Advertisement -

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...
Bitcoin (BTC) $ 93,434.00 0.58%
Ethereum (ETH) $ 3,279.62 1.42%
XRP (XRP) $ 2.28 2.54%
Bittensor (TAO) $ 291.61 8.99%
Polkadot (DOT) $ 2.20 0.12%
Cardano (ADA) $ 0.417715 0.79%
Chainlink (LINK) $ 13.94 0.43%
Hyperliquid (HYPE) $ 27.66 2.54%
Monero (XMR) $ 442.99 2.18%
Hedera (HBAR) $ 0.12901 0.43%
Toncoin (TON) $ 1.90 0.05%