Impact
NVIDIA's NemoClaw software includes an SSRF protection module called validateEndpointUrl. The flaw allows an attacker to provide a specially crafted endpoint URL that points to an address within the 0.0.0.0/8 range via either a blueprint configuration file or a command‑line flag. When the request is processed, the service initiates an internal HTTP call to the supplied address, giving the attacker the ability to reach internal resources and potentially leak sensitive information. The vulnerability is limited to information disclosure; it does not grant remote code execution or privilege escalation.
Affected Systems
The issue affects all deployments of NVIDIA's NemoClaw product that use the validateEndpointUrl component. No specific version or release number is listed, so any installation potentially using that component may be vulnerable.
Risk and Exploitability
The CVSS score of 6.3 indicates medium severity. EPSS is not available and the vulnerability is not listed in the CISA KEV catalog. Attackers likely need the ability to influence configuration files or command‑line arguments, implying local or remote access to the application layer. The attack path involves submitting a crafted URL referencing a private network address; the service then performs an outbound request, exposing internal data.
OpenCVE Enrichment