Description
NVIDIA Triton Inference Server contains a vulnerability in the DALI backend where an attacker could cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or information disclosure.
Published: 2026-05-20
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

NVIDIA Triton Inference Server has a flaw in its DALI backend that allows an attacker to read memory beyond intended bounds, possibly resulting in code execution, data tampering, denial of service, or information disclosure. The weakness is an out‑of‑bounds read (CWE‑125). This type of memory error can be leveraged by an adversary to corrupt execution flow or extract sensitive data if the boundary check fails. The severity is significant, with a CVSS score of 8, indicating a high level of potential impact.

Affected Systems

The issue affects NVIDIA Triton Inference Server, specifically the DALI (Data Augmentation Library) backend. No specific version range is provided in the data, so all installations that include the DALI backend are potentially exposed. Users should verify whether their Triton deployment includes or relies on the DALI component, as the vulnerability resides entirely within that module.

Risk and Exploitability

The CVSS score of 8 signals a high severity risk. The EPSS score is not available, but the lack of activity is not evidence of low risk, especially given the possible code execution outcome. The vulnerability is not listed in CISA's KEV catalog, so no public exploit is known; however, the combination of a zero‑day memory read and the potential for code execution means that it could be targeted by attackers with sufficient reconnaissance. The likely attack vector is remote, through interactions with the DALI backend, which federates data preprocessing for inference workloads. An attacker who can supply crafted input to the DALI pipeline may exploit this out‑of‑bounds read to trigger further malicious action.

Generated by OpenCVE AI on May 20, 2026 at 04:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update NVIDIA Triton Inference Server to the latest version that includes the patch for the DALI back‑end OOB read vulnerability
  • Disable or restrict external access to the DALI back‑end API until an official patch is installed
  • Monitor system logs for anomalous memory access patterns or signs of denial‑of‑service activity related to inference requests

Generated by OpenCVE AI on May 20, 2026 at 04:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*

Wed, 20 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 05:15:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Read in NVIDIA Triton DALI Back-end May Allow Code Execution

Wed, 20 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia triton Inference Server
Vendors & Products Nvidia
Nvidia triton Inference Server

Wed, 20 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description NVIDIA Triton Inference Server contains a vulnerability in the DALI backend where an attacker could cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or information disclosure.
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Nvidia Triton Inference Server
cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-05-20T12:21:36.282Z

Reserved: 2026-01-21T19:09:35.634Z

Link: CVE-2026-24213

cve-icon Vulnrichment

Updated: 2026-05-20T12:21:32.145Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-20T04:16:46.913

Modified: 2026-05-20T17:18:32.003

Link: CVE-2026-24213

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T05:00:17Z

Weaknesses