CVE-2023-31036

NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.5
References () https://nvidia.custhelp.com/app/answers/detail/a_id/5509 - Vendor Advisory () https://nvidia.custhelp.com/app/answers/detail/a_id/5509 - Vendor Advisory

18 Jan 2024, 20:45

Type Values Removed Values Added
CPE cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-22
References () https://nvidia.custhelp.com/app/answers/detail/a_id/5509 - () https://nvidia.custhelp.com/app/answers/detail/a_id/5509 - Vendor Advisory
First Time Microsoft windows
Nvidia
Linux
Nvidia triton Inference Server
Microsoft
Linux linux Kernel

12 Jan 2024, 18:05

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-12 17:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31036

Mitre link : CVE-2023-31036

CVE.ORG link : CVE-2023-31036


JSON object : View

Products Affected

linux

  • linux_kernel

nvidia

  • triton_inference_server

microsoft

  • windows
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')