PatchSiren cyber security CVE debrief
CVE-2025-33255 Nvidia CVE debrief
CVE-2025-33255 describes an unsafe deserialization weakness in the MPI server component of NVIDIA TRT-LLM. NVIDIA’s advisory and the NVD record identify the issue as CWE-502 and mark TRT-LLM versions before 1.2 as vulnerable. The published CVSS v3.1 score is 7.5 (HIGH), with potential impact including code execution, denial of service, data tampering, and information disclosure.
- Vendor
- Nvidia
- Product
- Tensorrt Llm
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-21
Who should care
Organizations running NVIDIA TRT-LLM, especially deployments that use or expose the MPI server component, should treat this as relevant. Security teams, platform owners, and operators responsible for NVIDIA AI inference or serving stacks should verify whether any installed TRT-LLM instances are earlier than version 1.2 and review their exposure and access controls.
Technical summary
The supplied records describe a CWE-502 unsafe deserialization issue in NVIDIA TRT-LLM’s MPI server. The NVD data lists affected CPE coverage for nvidia:tensorrt_llm with versions ending before 1.2, and the CVSS v3.1 vector is AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H. In practical terms, successful exploitation could have high confidentiality, integrity, and availability impact, but the vector also indicates local access, high attack complexity, and high privileges are required.
Defensive priority
High. The severity is rated HIGH and the expected impact is broad, including code execution and loss of confidentiality, integrity, and availability. Prioritize inventory, version verification, and vendor-guided remediation for any TRT-LLM deployment that includes the MPI server, even though the CVSS vector suggests the exploit path is constrained by local access and high privileges.
Recommended defensive actions
- Inventory all NVIDIA TRT-LLM deployments and confirm whether any instance is running a version earlier than 1.2.
- Apply NVIDIA’s vendor guidance from the official advisory and move affected systems to a fixed version or other vendor-recommended remediation.
- Limit access to the MPI server component and reduce exposure of any local, high-privilege execution paths used by the service.
- Review operational logs and security telemetry for unusual MPI server activity or unexpected deserialization-related errors.
- Treat affected hosts as high-risk until patched and verify backups and recovery procedures in case tampering or service disruption occurs.
Evidence notes
Evidence in the supplied corpus includes the NVD analyzed record for CVE-2025-33255, the primary weakness classification CWE-502, and a vulnerable CPE range for nvidia:tensorrt_llm ending before 1.2. The CVSS v3.1 vector is explicitly provided as AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H, and the official reference list includes the NVD detail page, the CVE.org record, and NVIDIA’s vendor advisory URL. The corpus does not include the full advisory text, so remediation details are limited to the official reference links and the version boundary present in the record.
Official resources
-
CVE-2025-33255 CVE record
CVE.org
-
CVE-2025-33255 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the official CVE/NVD record on 2026-05-20 and updated on 2026-05-21.