Impact
The vulnerability resides in the NeMo Framework’s checkpoint loading functionality, where deserialization of a checkpoint file is performed without proper validation. This flaw constitutes a deserialization vulnerability (CWE-502) that can allow an attacker to inject executable code and trigger remote code execution. Successful exploitation could lead to full system compromise, privilege escalation, information disclosure, and data tampering as indicated by the vendor’s description.
Affected Systems
The affected product is NVIDIA NeMo Framework. All builds that include the checkpoint loading feature are potentially impacted, as the CVE description does not narrow the scope to a specific version. Because version details are not supplied, administrators should assume that any deployment of NeMo Framework that loads checkpoints may be vulnerable until an update is applied.
Risk and Exploitability
The CVSS base score of 7.8 classifies this issue as High severity, while the EPSS score of less than 1% suggests a low prevalence of exploitation in the wild, and the vulnerability is not currently listed in CISA’s KEV catalogue. Exploitation would likely require a malicious checkpoint file to be fed into the application, either directly by an attacker with write access to the checkpoint directory or via a remote loading interface if exposed. The attack is therefore inferred to be remote, contingent on the exposure of the checkpoint loading mechanism.
OpenCVE Enrichment
Github GHSA