CVSS 3.1 Score 7.5 of 10 (high)


Published Jan 12, 2024
Updated: Jan 18, 2024


CVE-2023-31036 is a vulnerability affecting NVIDIA Triton Inference Server for Linux and Windows. When the server is launched with the non-default command line option "--model-control explicit," an attacker can exploit the model load API to perform a relative path traversal. This vulnerability has the potential to lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The base severity of this vulnerability is rated as HIGH, with a base score of 7.5 according to the Common Vulnerability Scoring System (CVSS). The privileges required for exploitation are considered low, and no user interaction is necessary. The attack vector is through the network. It is advisable for organizations using affected versions of NVIDIA Triton Inference Server to apply remediation measures promptly to mitigate the risk posed by this vulnerability.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-31036 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options