NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.
- https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266-part-2/
- https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266/
- https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape
- https://github.com/Blackwellrbrt167/nvidiascape-container-lab
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Mindasy/cve-2025-23266-migration-bypass
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/TalEliyahu/AI-Security-Newsletter
- https://github.com/Threekiii/CVE
- https://github.com/ctrsploit/ctrsploit
- https://github.com/jpts/cve-2025-23266-poc
- https://github.com/mrk336/CVE-2025-23266
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/placebeyondtheclouds/gpu-home-server
- https://github.com/r0binak/CVE-2025-23266
- https://github.com/ssst0n3/docker_archive
- https://github.com/ssst0n3/fake-nvidia
- https://github.com/tanjiti/sec_profile