NVIDIA Container Toolkit Vulnerability Allows Arbitrary Code Execution with Elevated Privileges

NVIDIA has issued an urgent security bulletin addressing two critical vulnerabilities in its Container Toolkit and GPU Operator software.

The vulnerabilities, discovered by security researchers and assigned CVE-2025-23266 and CVE-2025-23267, pose significant risks, including privilege escalation and denial of service attacks.

The company has released updated versions and provided immediate mitigation strategies for users unable to upgrade immediately.

Critical Vulnerabilities Discovered

The most severe vulnerability, CVE-2025-23266, carries a CVSS v3.1 base score of 9.0, marking it as critical severity.

This flaw exists in initialization hooks used by the Container Toolkit across all platforms, where attackers could execute arbitrary code with elevated permissions.

The vulnerability follows the CWE-426 pattern and enables escalation of privileges, data tampering, information disclosure, and denial of service attacks.

The second vulnerability, CVE-2025-23267, receives a high severity rating with a CVSS score of 8.5.

This flaw affects the update-ldcache hook, allowing attackers to exploit link following through specially crafted container images.

Classified under CWE-59, successful exploitation could lead to data tampering and denial of service.

Affected Products and Updates

NVIDIA Container Toolkit versions up to and including 1.17.7 are affected by both vulnerabilities, with the updated secure version being 1.17.8.

For users running Container Runtime in CDI mode, only versions before 1.17.5 are impacted by the critical vulnerability.

The NVIDIA GPU Operator for Linux platforms faces similar exposure, with all versions up to 25.3.0 requiring updates to the newly released 25.3.1.

Red Hat Enterprise Linux and OpenShift users must specifically target the v1.17.8-ubi8 tag when implementing fixes.

Mitigation Strategies Available

For organizations unable to immediately upgrade, NVIDIA provides a temporary mitigation by disabling the vulnerable enable-cuda-compat hook.

Users of NVIDIA Container Runtime in legacy mode can modify the /etc/nvidia-container-toolkit/config.toml file:

text[features]
disable-cuda-compat-lib-hook = true

GPU Operator users can implement mitigation through Helm deployment parameters:

bash--set "toolkit.env[0].name=NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES" \
--set "toolkit.env[0].value=disable-cuda-compat-lib-hook"

Organizations running GPU Operator versions before 25.3.1 can deploy the secure Container Toolkit version directly using:

bash--set "toolkit.version=v1.17.8-ubuntu20.04"

The vulnerabilities were responsibly disclosed by Nir Ohfeld and Shir Tamari working with Trend Zero Day Initiative, and Lei Wang and Min Yao from Nebula Security Lab at Huawei Cloud.

NVIDIA recommends immediate patching and advises users to consult the official Container Toolkit and GPU Operator documentation for complete installation guidance.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here