CVE-2025-23266: NVIDIA Container Toolkit for all platforms contains an Untrusted Search Path
(updated )
NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.
References
- github.com/NVIDIA/gpu-operator
- github.com/NVIDIA/k8s-device-plugin
- github.com/NVIDIA/mig-parted
- github.com/NVIDIA/nvidia-container-toolkit
- github.com/advisories/GHSA-vmg3-7v43-9g23
- kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266
- kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266-part-2
- news.ycombinator.com/item?id=44818412
- nvd.nist.gov/vuln/detail/CVE-2025-23266
- nvidia.custhelp.com/app/answers/detail/a_id/5659
- www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape
Code Behaviors & Features
Detect and mitigate CVE-2025-23266 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →