Stack-Based Buffer Overflow in NVIDIA CUDA Toolkit cuobjdump
CVE-2025-23339

3.3LOW

Key Information:

Vendor

Nvidia

Vendor
CVE Published:
24 September 2025

What is CVE-2025-23339?

CVE-2025-23339 is a vulnerability found within the NVIDIA CUDA Toolkit, specifically in a component known as cuobjdump. The CUDA Toolkit is a development platform that enables software developers to utilize NVIDIA GPUs for computing tasks, often in fields such as machine learning, data processing, and graphics rendering. The vulnerability allows an attacker to exploit a stack-based buffer overflow when cuobjdump processes a malicious ELF file. This exploit can lead to arbitrary code execution within the same privilege context as the user executing the cuobjdump command, posing significant risks to the security and integrity of systems using the toolkit.

Potential impact of CVE-2025-23339

  1. Arbitrary Code Execution: The most critical impact of this vulnerability is the potential for attackers to execute arbitrary code on the affected system. If a user unknowingly runs cuobjdump with a crafted ELF file, an attacker could gain control over the system, allowing them to perform unauthorized operations.

  2. Privilege Escalation: Since the exploit runs at the same privilege level as the user executing the cuobjdump, if that user has elevated privileges, an attacker could gain access to sensitive system resources or execute administrative commands, thereby escalating their access to critical components of the system.

  3. Risk of Data Breach: The exploitation of this vulnerability could lead to unauthorized access to sensitive data stored on the impacted systems. This could result in data leaks or theft, which can have severe repercussions for organizations in terms of compliance violations, reputational damage, and financial loss.

Affected Version(s)

NVIDIA CUDA Toolkit Windows All versions prior to CUDA Toolkit 13.0

References

CVSS V3.1

Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.