NVIDIA CUDA Toolkit cuobjdump Length Check Bypass leads to Arbitrary Code Exec
CVE-2025-23247 Published on May 27, 2025
NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution.
Vulnerability Analysis
CVE-2025-23247 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a length manipulation Vulnerability?
The software parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. If an attacker can manipulate the length parameter associated with an input such that it is inconsistent with the actual length of the input, this can be leveraged to cause the target application to behave in unexpected, and possibly, malicious ways. One of the possible motives for doing so is to pass in arbitrarily large input to the application. Another possible motivation is the modification of application state by including invalid data for subsequent properties of the application. Such weaknesses commonly lead to attacks such as buffer overflows and execution of arbitrary code.
CVE-2025-23247 has been classified to as a length manipulation vulnerability or weakness.
Products Associated with CVE-2025-23247
Want to know whenever a new CVE is published for NVIDIA Cuda Toolkit? stack.watch will email you.
Affected Versions
NVIDIA CUDA Toolkit Version All versions up to CUDA Toolkit 12.9 is affected by CVE-2025-23247Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.