Path Traversal Vulnerability in NVIDIA Triton Inference Server Allows for Code Execution and Data Tampering

Path Traversal Vulnerability in NVIDIA Triton Inference Server Allows for Code Execution and Data Tampering

CVE-2023-31036 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.