CVE-2025-23258

NVIDIA · NVIDIA DOCA

**A high-severity privilege escalation vulnerability in NVIDIA DOCA allows a local, low-privileged attacker to gain elevated permissions and completely compromise the affected system.**.

Executive summary

A high-severity privilege escalation vulnerability in NVIDIA DOCA allows a local, low-privileged attacker to gain elevated permissions and completely compromise the affected system.

Vulnerability

The vulnerability exists within the collectx-dpeserver Debian package for arm64 architectures. An authenticated attacker with low privileges on the local system can exploit this flaw to escalate their privileges, potentially to root or administrator level.

Business impact

This vulnerability is rated 7.3 (High), reflecting the severity of a local privilege escalation. A successful exploit would allow an attacker to bypass all security controls on the system, granting them the ability to read, modify, or delete any data, install malicious software such as rootkits or ransomware, and disable security tools. The integrity and confidentiality of the entire system would be compromised.

Remediation

Immediate Action: Apply the security updates provided by NVIDIA for the DOCA software suite immediately. This is the only way to fully remediate the vulnerability.

Proactive Monitoring: Monitor system logs for unauthorized or unexpected privilege escalation events (e.g., sudo activity from non-privileged accounts). Use file integrity monitoring to detect unauthorized changes to critical system files.

Compensating Controls: Enforce the principle of least privilege for all user accounts. Restrict shell access and software execution capabilities for low-privilege users to limit their ability to launch an exploit.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Privilege escalation vulnerabilities undermine the fundamental security model of an operating system. It is critical that administrators patch all affected systems running NVIDIA DOCA immediately to prevent a low-level compromise from escalating into a full system takeover.