Description
NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

The vulnerability in NVIDIA Triton Inference Server arises from insufficient input validation coupled with the ability to request a large number of outputs. This weakness can cause the server process to crash, preventing it from responding to legitimate inference requests. The core issue aligns with CWE‑789, leading to a denial of service without impacting data confidentiality or integrity.

Affected Systems

All versions of NVIDIA Triton Inference Server may be affected. The CNA list only includes the vendor/product; no specific version information is provided. Users should verify their deployment against NVIDIA documentation or support channels.

Risk and Exploitability

The CVSS score of 7.5 indicates a high risk, while the EPSS score is unavailable, making it hard to gauge exploitation frequency. The vulnerability is not in the CISA KEV catalog. Based on the description, the likely attack vector involves sending a crafted inference request with a large payload or many outputs to exhaust resources and trigger a crash. Precise prerequisites or attack vector details are inferred from the description.

Generated by OpenCVE AI on April 7, 2026 at 22:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest NVIDIA Triton Inference Server patch or upgrade to a newer release when available.
  • Confirm whether your deployment is vulnerable by contacting NVIDIA support or reviewing release notes.
  • Implement input size restrictions or validate inference requests to prevent large payloads from causing resource exhaustion.
  • Monitor server stability and log for crashes, and apply rate limiting as a temporary measure.

Generated by OpenCVE AI on April 7, 2026 at 22:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Denial of Service in NVIDIA Triton Inference Server Due to Insufficient Input Validation
First Time appeared Nvidia
Nvidia triton Inference Server
Vendors & Products Nvidia
Nvidia triton Inference Server

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Nvidia Triton Inference Server
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-04-07T19:18:08.817Z

Reserved: 2026-01-21T19:09:27.438Z

Link: CVE-2026-24146

cve-icon Vulnrichment

Updated: 2026-04-07T19:18:00.482Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T18:16:39.347

Modified: 2026-04-16T17:04:12.353

Link: CVE-2026-24146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:47:23Z

Weaknesses