Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Wiz finds exploit chain in Nvidia AI inference software

Wiz researchers discovered a vulnerability chain in Nvidia Triton enabling full AI server takeover without prior access.

byKerem Gülen
August 5, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Nvidia released a software update on Saturday to address critical vulnerabilities in its Triton server, identified by cybersecurity firm Wiz, which could enable AI model takeover, data theft, and response manipulation.

The vulnerabilities, deemed “critical” by Wiz, pertain to Nvidia’s Triton server, employed by clients to execute artificial intelligence models. Failure to patch these vulnerabilities could result in unauthorized control of AI models, exfiltration of sensitive data, and manipulation of AI responses. Nir Ohfeld, Wiz’s Head of Vulnerability Research, stated that Wiz Research discovered a vulnerability chain allowing an attacker with no prior access to gain complete control of an AI server.

This attack initiates with a minor bug that causes the server to leak a small piece of secret internal data. An attacker can then leverage this leaked data to exploit one of the server’s legitimate features, thereby gaining control over a private system component, which provides the initial foothold necessary to escalate privileges and achieve a full server takeover.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Triton functions as an open-source inference software developed by Nvidia, designed to optimize the deployment and performance of artificial intelligence models. While the complete roster of Triton users remains undisclosed, prominent enterprises such as Microsoft, Amazon, Oracle, Siemens, and American Express utilize the software.

A 2021 press release indicated that over 25,000 companies employ Nvidia’s AI stack. Nvidia’s spokesperson did not provide further comments beyond referring to the company’s security bulletin regarding these issues. The vulnerabilities have been officially assigned the identifiers CVE-2025-23319, CVE-2025-23320, and CVE-2025-23334.


Nvidia extends Windows 10 support, adds G-Sync monitors


Ohfeld emphasized that the most crucial step for users is to update to the patched version of the Nvidia Triton Inference Server, specifically version 25.07 or newer, as this directly resolves the entire vulnerability chain. He also noted that there is currently no evidence of these specific vulnerabilities being actively exploited in real-world scenarios, despite Nvidia Triton being a widely used platform for AI workloads.

Emerging technologies have faced significant security vulnerabilities in 2025. In the cryptocurrency sector, for example, exploits have led to substantial financial losses. Hacken, a blockchain security auditor, reported that access flaws and smart contract bugs contributed to $3.1 billion lost in crypto exploits during the first half of 2025. This amount surpasses the total losses recorded throughout 2024.


Featured image credit

Tags: FeaturedNvidia

Related Posts

Amazon’s new Leo Ultra antennas allow 1 Gbps speeds

Amazon’s new Leo Ultra antennas allow 1 Gbps speeds

November 25, 2025
Your YouTube Music 2025 Recap is rolling out now with a Gemini twist

Your YouTube Music 2025 Recap is rolling out now with a Gemini twist

November 25, 2025
Altman and Ive target 2027 for screenless AI device launch

Altman and Ive target 2027 for screenless AI device launch

November 25, 2025
Job listing reveals ‘Aluminium’ codename for Android desktop OS

Job listing reveals ‘Aluminium’ codename for Android desktop OS

November 25, 2025
Gmail Android notifications now show image attachment previews

Gmail Android notifications now show image attachment previews

November 25, 2025
Xbox Crocs arrive November 25 for

Xbox Crocs arrive November 25 for $80

November 25, 2025

LATEST NEWS

Amazon’s new Leo Ultra antennas allow 1 Gbps speeds

Your YouTube Music 2025 Recap is rolling out now with a Gemini twist

Altman and Ive target 2027 for screenless AI device launch

Job listing reveals ‘Aluminium’ codename for Android desktop OS

Gmail Android notifications now show image attachment previews

Xbox Crocs arrive November 25 for $80

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.