Description
NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface where an attacker on a VM may cause an incorrect calculation of buffer size by sending crafted configurations. A successful exploit of this vulnerability may lead to crash of the SNAP service, causing denial of service of the storage service to the host.
Published: 2026-03-24
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

NVIDIA SNAP-4 Container has a bug in its configuration interface that incorrectly calculates a buffer size when receiving crafted configuration data, leading to a crash of the SNAP service. The crash results in a denial of service for the storage service that relies on SNAP. The weakness falls under the category of buffer size miscalculation and is identified as CWE‑131.

Affected Systems

The vulnerability affects NVIDIA SNAP‑4 Container systems. No specific product version information is provided in the public description, so any deployment of SNAP‑4 Container remains potentially exposed until a vendor‑issued patch or update is applied.

Risk and Exploitability

The CVSS score of 6.8 indicates a medium severity impact, and the entry is not currently listed in the CISA Known Exploited Vulnerabilities catalog. EPSS information is unavailable, making it difficult to gauge current exploitation likelihood. The likely attack vector is a local attacker within a virtual machine that can send custom configuration commands to the SNAP service. Exploit execution requires that the attacker can reach the configuration interface, which may be reachable from within the virtual machine hosting the service. A successful exploitation would interrupt the storage service for all users on the host, potentially causing operational disruption.

Generated by OpenCVE AI on March 24, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check NVIDIA support resources for a patched version of SNAP‑4 Container and apply the update as soon as it is available.
  • If an update is not yet available, review access controls on the SNAP configuration interface and restrict management traffic to trusted hosts only.
  • Monitor SNAP service logs for abnormal crashes or repeated restart patterns and investigate any suspicious configuration traffic.
  • Consider isolating the virtual machine running SNAP from untrusted networks to reduce exposure until a patch is deployed.

Generated by OpenCVE AI on March 24, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Buffer Size Miscalculation in NVIDIA SNAP‑4 Container Leading to Denial of Service

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia snap-4 Container
Vendors & Products Nvidia
Nvidia snap-4 Container

Tue, 24 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface where an attacker on a VM may cause an incorrect calculation of buffer size by sending crafted configurations. A successful exploit of this vulnerability may lead to crash of the SNAP service, causing denial of service of the storage service to the host.
Weaknesses CWE-131
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Nvidia Snap-4 Container
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-03-24T20:55:26.724Z

Reserved: 2025-04-15T18:51:06.914Z

Link: CVE-2025-33216

cve-icon Vulnrichment

Updated: 2026-03-24T20:53:32.798Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T21:16:23.903

Modified: 2026-03-25T15:41:58.280

Link: CVE-2025-33216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:57:33Z

Weaknesses