Impact
NVIDIA TensorRT‑LLM contains a flaw in its MPI server that allows unsafe deserialization of untrusted data, granting an attacker the ability to execute arbitrary code. The malicious payload can also trigger denial of service, alter data, and exfiltrate sensitive information, making the impact severe from confidentiality, integrity, and availability standpoints. This weakness corresponds to CWE‑502, indicating the vulnerability arises from improper handling of serialized data.
Affected Systems
All installations of NVIDIA TensorRT‑LLM are affected because no specific version range is provided. Until an update is applied, every instance is considered vulnerable regardless of platform.
Risk and Exploitability
The CVSS base score of 7.5 categorizes the vulnerability as high severity. EPSS data is unavailable, and the issue is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is through the MPI interface over the network, delivering a crafted payload to trigger the unsafe deserialization. Given the nature of deserialization exploits, the likelihood of successful exploitation remains significant unless mitigated.
OpenCVE Enrichment