Security Flaws in NVIDIA Triton Allow Unauthenticated Attacks to Execute Code and Compromise AI Servers
Published: August 4, 2025
Category: AI Security / Vulnerability
A newly revealed set of vulnerabilities in NVIDIA’s Triton Inference Server—an open-source platform for deploying artificial intelligence (AI) models across Windows and Linux—puts susceptible servers at risk of takeover. Researchers Ronen Shustin and Nir Ohfeld from Wiz noted in a report released today that when these flaws are exploited together, they could enable remote, unauthenticated attackers to gain full control of the server, facilitating remote code execution (RCE). The identified vulnerabilities include:
- CVE-2025-23319 (CVSS Score: 8.1): An issue in the Python backend that allows for an out-of-bounds write via specifically crafted requests.
 
- CVE-2025-23320 (CVSS Score: 7.5): A flaw in the Python backend where an attacker can exceed the shared memory limit by sending an excessively large request.
 
- CVE-2025-23334 (CVSS Score: 5.9): A vulnerability in the Python backend that could lead to an out-of-bounds read.
 
Category: AI Security / Vulnerability
NVIDIA Triton Vulnerabilities Enable Unauthenticated Code Execution Risks in AI Servers August 4, 2025 A critical security issue has emerged concerning NVIDIA’s Triton Inference Server, a widely used open-source platform designed for deploying artificial intelligence models on Windows and Linux…