HIGHCVE-2025-23349CVSS 7.8

NVIDIA Megatron-LM for all platforms 包含一个漏洞,存在于 tasks/orqa/unsupervised/nq.py 组件中,攻击者可能导致代码注入。成功利用此漏洞可能

平台

python

组件

megatron-lm

修复版本

0.13.2

AI Confidence: highNVDEPSS 0.0%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-23349 describes a code injection vulnerability discovered in NVIDIA Megatron-LM, a framework for large language model training. Successful exploitation could lead to unauthorized code execution and compromise system integrity. This vulnerability affects all versions of Megatron-LM prior to 0.13.1 and 0.12.3. A patch is available in version 0.13.1.

Python

检测此 CVE 是否影响你的项目

上传你的 requirements.txt 文件,立即知道是否受影响。

上传 requirements.txt支持的格式: requirements.txt · Pipfile.lock

影响与攻击场景翻译中…

The vulnerability resides within the tasks/orqa/unsupervised/nq.py component of Megatron-LM. An attacker who can manipulate input to this component can inject malicious code, potentially gaining control of the system running Megatron-LM. This could involve executing arbitrary commands, accessing sensitive data used in model training, modifying training data to influence model behavior, or escalating privileges to access other resources on the system. The impact is particularly severe in environments where Megatron-LM is used for sensitive data processing or critical infrastructure.

利用背景翻译中…

CVE-2025-23349 was published on 2025-09-24. Currently, there are no publicly available proof-of-concept exploits. The EPSS score is pending evaluation. It is recommended to monitor security advisories and threat intelligence feeds for any updates regarding active exploitation campaigns.

哪些人处于风险中翻译中…

Organizations and researchers utilizing NVIDIA Megatron-LM for large language model training, particularly those running older versions (prior to 0.13.1 and 0.12.3) in production environments or development labs. Environments with limited access controls or inadequate input validation are at higher risk.

检测步骤翻译中…

• python / code-injection:

import os
import subprocess

def check_megatron_version():
    try:
        result = subprocess.check_output(['python', '-c', 'import megatron_lm; print(megatron_lm.__version__)'], stderr=subprocess.STDOUT)
        version = result.decode('utf-8').strip()
        if version.startswith('0.12') or version.startswith('0.13'):
            print(f"Vulnerable version detected: {version}")
        else:
            print(f"Safe version detected: {version}")
    except FileNotFoundError:
        print("Megatron-LM not found.")
    except subprocess.CalledProcessError as e:
        print(f"Error checking version: {e}")

check_megatron_version()

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.02% (6% 百分位)

CISA SSVC

利用情况none
可自动化no
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H7.8HIGHAttack VectorLocal攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredLow攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
本地 — 攻击者需要系统上的本地会话或Shell。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
低 — 任何有效用户账户均可。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件megatron-lm
供应商NVIDIA
影响范围修复版本
All versions prior to 0.13.1 and 0.12.3 – All versions prior to 0.13.1 and 0.12.30.13.2

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation is to upgrade to NVIDIA Megatron-LM version 0.13.1 or later, which contains the fix. If immediate upgrading is not possible, consider isolating instances running vulnerable versions of Megatron-LM to limit the potential blast radius. Review and restrict access to the tasks/orqa/unsupervised/nq.py component. Implement input validation and sanitization to prevent malicious code injection attempts. Monitor system logs for suspicious activity related to Megatron-LM processes.

修复方法翻译中…

Actualice NVIDIA Megatron-LM a la versión 0.13.1 o superior. Si no es posible actualizar inmediatamente, considere aplicar las mitigaciones recomendadas por NVIDIA. Revise y valide las entradas del componente tasks/orqa/unsupervised/nq.py para evitar la inyección de código.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-23349 — Code Injection in NVIDIA Megatron-LM?

CVE-2025-23349 is a code injection vulnerability affecting NVIDIA Megatron-LM versions before 0.13.1 and 0.12.3, allowing potential code execution and data compromise.

Am I affected by CVE-2025-23349 in NVIDIA Megatron-LM?

You are affected if you are using NVIDIA Megatron-LM versions prior to 0.13.1 or 0.12.3. Check your version and upgrade immediately if vulnerable.

How do I fix CVE-2025-23349 in NVIDIA Megatron-LM?

Upgrade to NVIDIA Megatron-LM version 0.13.1 or later to resolve the vulnerability. Consider temporary isolation and input validation as interim measures.

Is CVE-2025-23349 being actively exploited?

Currently, there are no confirmed reports of active exploitation, but it's crucial to apply the patch promptly to mitigate potential risks.

Where can I find the official NVIDIA advisory for CVE-2025-23349?

Refer to the NVIDIA security bulletin for detailed information and updates regarding CVE-2025-23349: [https://nvidia.github.io/megatron-lm/security/advisories/](https://nvidia.github.io/megatron-lm/security/advisories/)

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。