Description
NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure.
Published: 2026-04-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

NVIDIA NeMoClaw contains an improper access control flaw in the sandbox environment initialization component. A remote attacker can send prompt‑injected content that causes the agent to read and exfiltrate host environment variables that should have been restricted during sandbox creation. The primary consequence is the disclosure of sensitive information gleaned from those variables, potentially revealing configuration secrets or credentials. This weakness is classified as CWE‑497 and results in a high CVSS score of 8.6.

Affected Systems

The vulnerability affects NVIDIA NeMoClaw. No specific product versions are listed in the CNA data, so any deployed instance of NeMoClaw could be impacted until an official fix is applied.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability requiring prompt attention. While the EPSS score is not available, the lack of a KEV listing does not mitigate the risk of exploitation. The likely attack vector is remote; an adversary must be able to interact with the NeMoClaw agent, typically via network or API access, to inject the malicious prompt that triggers the unauthorized read of host environment variables. Successful exploitation leads to unprivileged information disclosure that could aid further attacks.

Generated by OpenCVE AI on April 29, 2026 at 02:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NeMoClaw to a version that contains the vendor‑supplied fix once it is released; consult NVIDIA’s official advisory for patch details
  • If an update cannot be applied immediately, segment the NeMoClaw deployment from untrusted networks or implement firewall rules to restrict inbound connections to the agent endpoint
  • Review and strengthen the sandbox initialization configuration by explicitly blocking or sanitizing host environment variables from being exposed to the agent, thereby addressing the CWE‑497 misuse of restricted permissions

Generated by OpenCVE AI on April 29, 2026 at 02:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia nemoclaw
Vendors & Products Nvidia
Nvidia nemoclaw

Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Remote Information Disclosure via Prompt Injection in NeMoClaw Sandbox Initialization

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure.
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2026-04-29T15:11:41.945Z

Reserved: 2026-01-21T19:09:36.964Z

Link: CVE-2026-24222

cve-icon Vulnrichment

Updated: 2026-04-29T13:51:57.727Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:36:45.517

Modified: 2026-04-28T20:10:42.070

Link: CVE-2026-24222

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:30Z

Weaknesses