CVE-2025-23256

NVIDIA · NVIDIA Multiple Products

**A high-severity incorrect authorization vulnerability in the NVIDIA BlueField management interface allows a local attacker to illegitimately modify system configurations.**.

Executive summary

A high-severity incorrect authorization vulnerability in the NVIDIA BlueField management interface allows a local attacker to illegitimately modify system configurations.

Vulnerability

The vulnerability exists in the management interface of NVIDIA BlueField DPUs. An authenticated attacker with local access can exploit this flaw to bypass authorization checks and make unauthorized modifications to the system's configuration.

Business impact

Successful exploitation allows an attacker to alter critical system settings, potentially leading to privilege escalation, system instability, or a persistent denial-of-service condition. The CVSS score of 8.7 (High) reflects the severity of allowing a lower-privileged local user to gain administrative control over the configuration, which could compromise the entire host system.

Remediation

Immediate Action: Apply the security updates released by NVIDIA to all affected BlueField products as soon as possible.

Proactive Monitoring: Monitor system audit logs for unauthorized or suspicious configuration changes. Implement file integrity monitoring on critical configuration files to detect unauthorized modifications.

Compensating Controls: Enforce the principle of least privilege for all user accounts with local access to the system. Restrict local login access to only authorized administrative personnel.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability presents a serious risk of privilege escalation for systems utilizing NVIDIA BlueField DPUs. It is critical to apply the vendor's patch immediately to prevent attackers who have gained initial local access from elevating their privileges and taking full control of the affected systems.