CVE-2025-23257

NVIDIA · NVIDIA DOCA

**A high-severity privilege escalation vulnerability in an NVIDIA DOCA Debian package allows a local attacker with low privileges to gain elevated, likely root, permissions on the affected system.**.

Executive summary

A high-severity privilege escalation vulnerability in an NVIDIA DOCA Debian package allows a local attacker with low privileges to gain elevated, likely root, permissions on the affected system.

Vulnerability

A vulnerability within the collectx-clxapidev Debian package allows a local actor with low privileges to escalate their permissions. This type of flaw often stems from insecure file permissions, SUID binaries with controllable inputs, or command injection in scripts that run with higher privileges.

Business impact

With a CVSS score of 7.3 (High), this vulnerability poses a significant threat to the security of systems with NVIDIA DOCA installed. An attacker who has already gained an initial low-privilege foothold (e.g., as a normal user) can exploit this flaw to gain full root control of the system. This would allow them to disable security controls, steal all data, install persistent malware, and pivot to other systems on the network.

Remediation

Immediate Action: Apply the security updates provided by NVIDIA for the affected DOCA package immediately. Prioritize patching on multi-user systems and critical infrastructure.

Proactive Monitoring: Monitor system audit logs for unusual process execution by low-privilege users, especially any interaction with files or binaries related to the collectx-clxapidev package. Look for unauthorized modifications to system files.

Compensating Controls: Enforce the principle of least privilege, ensuring users and services have only the permissions they absolutely require. Utilize endpoint security solutions to detect and block privilege escalation techniques.

Exploitation status

Public Exploit Available: false

Analyst recommendation

A local privilege escalation vulnerability is a critical weakness that nullifies system access controls. It is imperative that system administrators deploy the NVIDIA patch immediately to prevent attackers from elevating a minor intrusion into a full system compromise.