Impact
A buffer overflow in NVIDIA TensorRT allows an attacker to write beyond the bounds of a memory region. This out‑of‑bounds write can modify legitimate data structures and lead to data tampering. The vulnerability is classified as CWE‑787, which highlights a flaw in bounds checking and memory safety.
Affected Systems
The affected product is NVIDIA TensorRT. Specific vulnerable versions are not disclosed in the current data, so all releases should be examined for the presence of the patch once it becomes available.
Risk and Exploitability
The CVSS score of 8.2 marks this vulnerability as high risk. No EPSS score is available, so current exploitation probability cannot be quantified. The vendor has not listed this issue in the CISA KEV catalog, suggesting there is no widespread evidence of exploitation yet. Because the description does not detail the attack vector, it is inferred that an attacker would need to interact with TensorRT in a way that allows them to invoke the write operation—this could be via a privileged application or potentially over a network if TensorRT services are exposed. The combination of high severity and unknown exploitation likelihood warrants cautious assessment and timely remediation.
OpenCVE Enrichment