

GitLab Fixes Flaws Allowing Auth Bypass and DoS
November 28, 2025
AI-Powered Cyberattacks: How Generative Models Are Changing the Threat Landscape
November 28, 2025
GitLab Fixes Flaws Allowing Auth Bypass and DoS
November 28, 2025
AI-Powered Cyberattacks: How Generative Models Are Changing the Threat Landscape
November 28, 2025Severity
High
Analysis Summary
NVIDIA has released an urgent security update for its DGX Spark AI workstation after uncovering 14 firmware vulnerabilities that put the platform at significant risk. These flaws affect critical components of the DGX Spark GB10 system, including SROOT, OSROOT, and hardware resource controls, allowing attackers to interfere with low-level system functions. The most severe vulnerability, CVE-2025-33187, carries a CVSS score of high and impacts all DGX Spark devices running firmware versions prior to the new OTA0 update. Collectively, these issues expose the AI workstation to high-impact threats involving code execution, unauthorized system access, and denial-of-service attacks.
NVIDIA’s Offensive Security Research team identified these weaknesses, warning that attackers particularly those with local or privileged access could bypass firmware safeguards, manipulate protected system-on-chip (SoC) regions, and modify hardware controls. The vulnerabilities span multiple categories, including CWE-269 (privilege issues), CWE-787 (out-of-bounds write), CWE-20 (input validation errors), and several others. Depending on the vulnerability, attackers could achieve code execution, information disclosure, data tampering, system manipulation, denial-of-service attacks, or in severe cases, privilege escalation.
A detailed breakdown shows CVEs with varying severity scores from the critical (CVE-2025-33187) down to 2.3 highlighting the broad attack surface. Some flaws allow direct code execution or access to protected memory regions, while others enable data leakage or system disruption. Although most vulnerabilities require local access, NVIDIA cautions that certain flaws can be triggered without full privileges, increasing their potential impact. Given that DGX Spark workstations are widely used for AI and machine-learning workloads, an exploitation could result in the theft or compromise of sensitive AI models, datasets, and training pipelines.
NVIDIA strongly urges all organizations and users to immediately install the latest DGX OS version (OTA0), which patches all 14 CVEs at once. Customers should download the update from the official NVIDIA DGX website, and subscribe to NVIDIA’s Product Security alerts for ongoing updates. With the increasing reliance on high-performance AI systems, timely patching is crucial to maintaining system integrity and preventing potential breaches, service disruption, or unauthorized access to valuable AI assets.
Impact
- Gain Access
- Code Execution
- Data Theft
- Denial-of-Service
- Privilege Escalation
Indicators of Compromise
CVE
- CVE-2025-33187
- CVE-2025-33188
- CVE-2025-33189
- CVE-2025-33190
- CVE-2025-33191
- CVE-2025-33192
- CVE-2025-33193
- CVE-2025-33194
- CVE-2025-33195
- CVE-2025-33196
- CVE-2025-33197
- CVE-2025-33198
- CVE-2025-33199
- CVE-2025-33200
Affected Vendors
Remediation
- Immediately install the latest DGX OS OTA0 update, which patches all 14 vulnerabilities.
- Verify firmware versions on all DGX Spark devices and ensure none are running versions prior to OTA0.
- Restrict local and privileged access to the DGX Spark workstation to minimize exploitation risk.
- Implement strict access controls for administrators and privileged users to prevent unauthorized modifications.
- Enable secure boot and firmware integrity checks to detect tampering of SROOT, OSROOT, or hardware controls.
- Monitor system logs and hardware access events for abnormal activity or unauthorized access attempts.
- Segment DGX Spark systems from general networks to limit lateral movement in case of compromise.
- Regularly update security policies for AI and ML infrastructure to include firmware-level protection guidelines.
- Subscribe to NVIDIA Product Security bulletins for immediate alerts on future vulnerabilities.
- Report any suspicious activity or potential vulnerabilities to NVIDIA’s Product Security team promptly.








