Description
NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.
Published: 2026-03-24
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the NeMo Framework’s checkpoint loading functionality, where deserialization of a checkpoint file is performed without proper validation. This flaw constitutes a deserialization vulnerability (CWE-502) that can allow an attacker to inject executable code and trigger remote code execution. Successful exploitation could lead to full system compromise, privilege escalation, information disclosure, and data tampering as indicated by the vendor’s description.

Affected Systems

The affected product is NVIDIA NeMo Framework. All builds that include the checkpoint loading feature are potentially impacted, as the CVE description does not narrow the scope to a specific version. Because version details are not supplied, administrators should assume that any deployment of NeMo Framework that loads checkpoints may be vulnerable until an update is applied.

Risk and Exploitability

The CVSS base score of 7.8 classifies this issue as High severity, while the EPSS score of less than 1% suggests a low prevalence of exploitation in the wild, and the vulnerability is not currently listed in CISA’s KEV catalogue. Exploitation would likely require a malicious checkpoint file to be fed into the application, either directly by an attacker with write access to the checkpoint directory or via a remote loading interface if exposed. The attack is therefore inferred to be remote, contingent on the exposure of the checkpoint loading mechanism.

Generated by OpenCVE AI on March 31, 2026 at 05:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if an update or patch for NeMo Framework has been released by NVIDIA to address the checkpoint loading vulnerability. If available, download and deploy the patch immediately.
  • Until a patch is applied, restrict file system permissions on the directories used for storing checkpoint files so that only trusted applications or users may write them.
  • Disable the checkpoint loading feature if it is not required for your deployment.
  • Enable detailed logging for all checkpoint load operations and monitor for anomalous activity.

Generated by OpenCVE AI on March 31, 2026 at 05:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m4jw-wgmf-889x NVIDIA NeMo Framework contains an RCE vulnerability in checkpoint loading
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Remote Code Execution in NVIDIA NeMo Framework Checkpoint Loading

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia nemo
CPEs cpe:2.3:a:nvidia:nemo:*:*:*:*:*:*:*:*
Vendors & Products Nvidia nemo

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Remote Code Execution in NVIDIA NeMo Framework Checkpoint Loading

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia nemo Framework
Vendors & Products Nvidia
Nvidia nemo Framework

Tue, 24 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Nvidia Nemo Nemo Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-03-25T03:56:16.911Z

Reserved: 2026-01-21T19:09:29.851Z

Link: CVE-2026-24157

cve-icon Vulnrichment

Updated: 2026-03-24T20:53:26.652Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T21:16:27.823

Modified: 2026-03-31T01:29:58.490

Link: CVE-2026-24157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:20Z

Weaknesses