Impact
NVIDIA Triton Inference Server allows an attacker to bypass authentication controls, which can lead to unauthorized privilege escalation, disruption of service, or exposure of sensitive data. The weakness aligns with CWE-288, describing an authentication failure that permits unauthorized access. No additional exploitation conditions are documented beyond the bypass.
Affected Systems
The affected vendor is NVIDIA and the product is the Triton Inference Server. Specific impacted versions are not listed in the advisory.
Risk and Exploitability
The CVSS score of 7.3 classifies this vulnerability as high severity, indicating significant impact if exploited. Because no EPSS score is available, the current exploitation probability cannot be quantified, and the vulnerability is not listed in CISA's KEV catalog, suggesting limited or no known active exploitation. Based on the description, the likely attack vector is across network interfaces where the server’s authentication mechanism can be accessed, allowing an attacker to reach the server’s administrative or inference endpoints without valid credentials. The absence of detailed exploitation steps implies that operational or configuration weaknesses would enable the bypass.
OpenCVE Enrichment