Vulnerability Details : CVE-2025-23359
NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Vulnerability category: Denial of serviceInformation leak
Products affected by CVE-2025-23359
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2025-23359
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 36 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2025-23359
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.3
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
1.6
|
6.0
|
NVIDIA Corporation | 2025-02-12 |
8.3
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
N/A
|
N/A
|
RedHat-CVE-2025-23359 | 2025-02-12 |
CWE ids for CVE-2025-23359
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: psirt@nvidia.com (Secondary)
References for CVE-2025-23359
-
https://nvidia.custhelp.com/app/answers/detail/a_id/5616
Security Bulletin: NVIDIA Container Toolkit - 11 February 2025 | NVIDIA
-
https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html
Jump to