Description
NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.
Published: 2026-03-24
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

NVIDIA Triton Inference Server is vulnerable to an internal state corruption flaw that can trigger a denial of service. The weakness is a race condition impacting the server’s ability to process inference requests correctly. When exploited, the server can become unresponsive, leading to service disruption for any application relying on the inference engine. The Primary impact is on availability, as reflected by a CVSS score of 7.5.

Affected Systems

All deployments of NVIDIA Triton Inference Server are affected. No specific firmware or software release numbers were listed in the available data, so any version that contains the vulnerable code path requires assessment of the latest builds from NVIDIA to determine if the issue has been fixed.

Risk and Exploitability

The assessed criticality is high, with a CVSS score of 7.5, and the EPSS score is reported as less than 1%, indicating a low current likelihood of exploitation. This vulnerability is not recorded in CISA’s Known Exploited Vulnerabilities catalog. The description does not detail how the race condition is triggered, but the likely attack vector is through the network interface by sending specially crafted inference requests, as is common with Triton server vulnerabilities. This inference is based on the nature of the software and typical exploits of internal state corruption in similar systems.

Generated by OpenCVE AI on March 31, 2026 at 06:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest NVIDIA Triton Inference Server patch or upgrade to the most recent release that addresses the issue.
  • Verify that the server service is running the patched version before resuming normal operations.
  • If a patch or upgrade cannot be applied immediately, restrict network access to the inference endpoint so that only trusted clients can reach it.
  • Monitor server logs for abnormal request handling or unexpected crashes that might indicate an attempt to trigger the race condition.
  • Restart the Triton service after applying the patch to ensure that all internal state is cleanly reinitialized.

Generated by OpenCVE AI on March 31, 2026 at 06:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Denial of Service via Internal State Corruption in NVIDIA Triton Inference Server

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Denial of Service via Internal State Corruption in NVIDIA Triton Inference Server

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia triton Inference Server
Vendors & Products Nvidia
Nvidia triton Inference Server

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.
Weaknesses CWE-362
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Nvidia Triton Inference Server
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-03-25T14:27:22.512Z

Reserved: 2025-04-15T18:51:08.848Z

Link: CVE-2025-33254

cve-icon Vulnrichment

Updated: 2026-03-25T14:22:39.743Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T21:16:24.917

Modified: 2026-03-31T01:31:20.400

Link: CVE-2025-33254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:22Z

Weaknesses