NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

An urgent security update for its DGX Spark AI workstation after discovering 14 vulnerabilities in the system’s firmware that could allow attackers to execute malicious code and launch denial-of-service attacks.

The most severe flaw has a CVSS score of 9.3 and affects all DGX Spark devices running versions before the new OTA0 update.

The vulnerabilities reside in multiple firmware components of the DGX Spark GB10, including SROOT, OSROOT, and hardware resource controls.

NVIDIA’s Offensive Security Research team identified these flaws, which expose the AI workstation to serious security risks.

Attackers with local access can exploit these weaknesses to bypass security protections, modify hardware controls, and gain unauthorized access to protected areas of the system-on-chip.

The critical vulnerability, tracked as CVE-2025-33187, allows attackers with privileged access to breach SoC-protected areas.

CVE IDBase ScoreCWEPotential Impacts
CVE-2025-331879.3CWE-269Code execution, information disclosure, data tampering, denial of service, escalation of privileges
CVE-2025-331888.0CWE-269Information disclosure, data tampering, denial of service
CVE-2025-331897.8CWE-787Code execution, data tampering, denial of service, information disclosure, escalation of privileges
CVE-2025-331906.7CWE-787Code execution, data tampering, denial of service, escalation of privileges
CVE-2025-331915.7CWE-20Denial of service
CVE-2025-331925.7CWE-690Code execution, denial of service, information disclosure
CVE-2025-331935.7CWE-354Code execution, denial of service, information disclosure
CVE-2025-331945.7CWE-180Information disclosure, denial of service
CVE-2025-331954.4CWE-119Data tampering, denial of service, escalation of privileges
CVE-2025-331964.4CWE-226Information disclosure
CVE-2025-331974.3CWE-476Code execution, denial of service
CVE-2025-331983.3CWE-226Information disclosure
CVE-2025-331993.2CWE-670Data tampering
CVE-2025-332002.3CWE-226Information disclosure

Potentially leading to code execution, data theft, system manipulation, denial-of-service attacks, or privilege escalation. This flaw requires immediate attention due to its critical severity rating and comprehensive impact on system integrity.

All NVIDIA DGX Spark systems running versions before OTA0 are vulnerable. The security update addresses all 14 CVEs simultaneously.

NVIDIA urges customers to download and install the latest DGX OS version immediately from the official NVIDIA DGX website.

Users can also visit the NVIDIA Product Security page to subscribe to security bulletins and report potential security issues. The vulnerabilities primarily require local access to exploit, though some can be triggered without privileges.

Organizations using DGX Spark workstations for AI development and machine learning workloads should prioritize this update to prevent potential compromise of sensitive AI models and training data.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks appeared first on Cyber Security News.