Impact
The vulnerability permits an attacker to perform a path traversal by manipulating input sent to NVIDIA Triton Inference Server, allowing the attacker to request files outside intended directories. Successful exploitation can result in denial of service, as the server may crash or become unavailable. This weakness is an instance of CWE‑22, which indicates insufficient validation of path strings.
Affected Systems
Any deployment of NVIDIA Triton Inference Server that has not applied the latest vendor update is susceptible. The CVE record does not list specific version numbers, so all pre‑patch releases are considered affected until verified otherwise.
Risk and Exploitability
The CVSS score of 7.5 categorizes this as high severity. No EPSS data are publicly available, so the likelihood of exploitation remains uncertain. The vulnerability is not currently listed in the CISA KEV catalog. Based on the description, the likely attack vector involves an adversary sending a crafted HTTP or gRPC request over the network to trigger the path traversal and cause the service to terminate, leading to downtime.
OpenCVE Enrichment