Critical Security Vulnerabilities in NVIDIA GPU Drivers: Privilege Escalation and DoS Risks Patched
NVIDIA has disclosed several critical security vulnerabilities affecting its GPU display drivers and virtual GPU (vGPU) software. Security updates have been released to address these issues, and administrators are encouraged to apply them promptly.
A significant vulnerability (CVE-2025-23244) has been discovered in NVIDIA’s Linux GPU display drivers that could allow privilege escalation. According to the Common Vulnerability Scoring System (CVSS v3.1), this security flaw has received a base score of 7.8, categorizing it as “High” severity.
This vulnerability potentially allows local attackers to gain elevated permissions on affected systems, posing serious security risks for organizations using NVIDIA graphics hardware on Linux environments.
Two additional vulnerabilities have been identified in NVIDIA’s virtual GPU software:
The first issue (CVE-2025-23245) affects the Virtual GPU Manager and could allow unauthorized access to global resources from virtual machines. This creates potential security boundaries breaches between virtualized environments.
The second vulnerability (CVE-2025-23246) involves uncontrolled resource consumption in the Virtual GPU Manager, which could lead to denial-of-service conditions in both Windows and Linux environments.
Both vGPU vulnerabilities have been assigned a CVSS base score of 5.5, placing them in the “Medium” severity category.
NVIDIA has released security updates for the following products:
IT administrators should immediately apply the appropriate security updates to all affected systems. Organizations with large NVIDIA deployments should prioritize patching based on:
While applying patches, consider implementing these additional security measures: