Description
NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
Published: 2026-03-24
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Apply Fix
AI Analysis

Impact

The vulnerability lies in the quantization configuration loading routine of NVIDIA Megatron LM. An attacker who can supply a crafted configuration file may trigger the loader to execute malicious code, leading to remote code execution. The weakness is a deserialization of untrusted data (CWE-502). Successful exploitation could grant an attacker remote code execution, privilege escalation, disclosure of sensitive data, and manipulation of application state.

Affected Systems

The flaw affects all deployments of NVIDIA Megatron LM that use the default quantization configuration loader. No specific version range is supplied, so any installation that includes this loader component is potentially vulnerable. The CNA identifies the vendor as NVIDIA and the product as Megatron LM.

Risk and Exploitability

The CVSS base score of 7.8 indicates a high severity vulnerability. The EPSS score of less than 1% suggests that, at present, the likelihood of exploitation is low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector requires remote access, likely through the ability to provide or force the loader to read a malicious configuration file. If exploited, the attacker could compromise confidentiality, integrity, and availability of the affected system.

Generated by OpenCVE AI on March 26, 2026 at 02:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether NVIDIA Megatron LM has released an update or patch that addresses the quantization configuration loading issue and apply it promptly.
  • Restrict network access to the Megatron LM instance so that only trusted hosts can supply or force quantization configuration files.
  • Enforce least privilege for the Megatron LM process and set restrictive file permissions on configuration directories to prevent unauthorized modification.
  • Monitor logs for unusual configuration loading events or anomalous process activity that could indicate an attempted exploitation.
  • Maintain an updated inventory of systems using Megatron LM and schedule regular security reviews to assess ongoing risk.

Generated by OpenCVE AI on March 26, 2026 at 02:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Quantization Config Loading in NVIDIA Megatron LM

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Quantization Config Loading in NVIDIA Megatron LM
CPEs cpe:2.3:a:nvidia:megatron-lm:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia megatron-lm
Vendors & Products Nvidia
Nvidia megatron-lm

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Nvidia Megatron-lm
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-03-25T14:28:00.824Z

Reserved: 2025-04-15T18:51:08.847Z

Link: CVE-2025-33247

cve-icon Vulnrichment

Updated: 2026-03-25T14:02:19.828Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T21:16:24.610

Modified: 2026-03-25T21:58:57.220

Link: CVE-2025-33247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:18:50Z

Weaknesses