Impact
NVIDIA Triton Inference Server is vulnerable to an integer overflow that can be triggered by malformed input. The flaw is a classic overflow in a signed integer calculation, as identified by CWE-190. If an attacker succeeds, the overflow can corrupt internal data structures or cause the server process to terminate, resulting in a denial of service. The impact is loss of availability of the inference service and potential interruption of business operations that rely on real‑time inference.
Affected Systems
The vulnerability applies to NVIDIA Triton Inference Server. Specific affected releases are not enumerated in the CVE record, so all versions should be assumed potentially impacted until a vendor release is confirmed.
Risk and Exploitability
The CVSS score of 7.5 indicates a high level of severity. The EPSS score is not available, but the absence of a KEV listing suggests no known active exploitation at this time. The most likely attack path is via the network exposed inference endpoints, with the attacker crafting a payload that forces the integer overflow. Successful exploitation would lead to a service crash, a classic denial-of-service scenario.
OpenCVE Enrichment