Impact
The vulnerability lies in the quantization configuration loading routine of NVIDIA Megatron LM. An attacker who can supply a crafted configuration file may trigger the loader to execute malicious code, leading to remote code execution. The weakness is a deserialization of untrusted data (CWE-502). Successful exploitation could grant an attacker remote code execution, privilege escalation, disclosure of sensitive data, and manipulation of application state.
Affected Systems
The flaw affects all deployments of NVIDIA Megatron LM that use the default quantization configuration loader. No specific version range is supplied, so any installation that includes this loader component is potentially vulnerable. The CNA identifies the vendor as NVIDIA and the product as Megatron LM.
Risk and Exploitability
The CVSS base score of 7.8 indicates a high severity vulnerability. The EPSS score of less than 1% suggests that, at present, the likelihood of exploitation is low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector requires remote access, likely through the ability to provide or force the loader to read a malicious configuration file. If exploited, the attacker could compromise confidentiality, integrity, and availability of the affected system.
OpenCVE Enrichment