PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-24206 NVIDIA CVE debrief

CVE-2026-24206 is a high-severity authentication-bypass vulnerability in NVIDIA Triton Inference Server. NVD rates it 7.3 with a network attack vector, low complexity, and no privileges or user interaction required (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). NVIDIA identifies CWE-288, and the affected range in the NVD record is Triton Inference Server versions before 26.03. In practical terms, an exposed affected deployment could be abused to bypass authentication and potentially lead to unauthorized access, privilege escalation, denial of service, or information disclosure.

Vendor
NVIDIA
Product
Triton Inference Server
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-20
Advisory published
2026-05-20
Advisory updated
2026-05-20

Who should care

Teams operating NVIDIA Triton Inference Server, especially internet-facing, shared, or production AI inference deployments, should treat this as a priority issue. Security and platform owners should focus on any instance running a version earlier than 26.03.

Technical summary

The official record describes an authentication bypass issue in NVIDIA Triton Inference Server. NVD lists the vulnerable CPE as nvidia:triton_inference_server with versions ending before 26.03 and assigns CWE-288. The CVSS vector indicates a remotely reachable issue with no auth or user interaction needed, and limited impacts to confidentiality, integrity, and availability. The NVD reference set points to NVIDIA PSIRT advisory material and the CVE record.

Defensive priority

High. A remotely exploitable authentication bypass in an inference server can directly undermine access controls and create follow-on risk for data exposure or service disruption. Prioritize affected Triton deployments that are exposed to untrusted networks or integrated into broader production workflows.

Recommended defensive actions

  • Upgrade NVIDIA Triton Inference Server to version 26.03 or later, or otherwise move to a vendor-fixed release.
  • Inventory all Triton Inference Server instances and confirm which ones are running affected versions before 26.03.
  • Restrict network exposure of Triton services to trusted management and application networks until remediation is complete.
  • Review authentication and access-control assumptions around any Triton deployment that may have been reachable by untrusted users.
  • Monitor vendor advisories and NVD updates for any additional mitigation guidance or revised impact details.

Evidence notes

Source dates supplied for this record are 2026-05-20T04:16:45.713Z published and 2026-05-20T17:31:24.760Z modified. NVD marks the vulnerability status as Analyzed. The official metadata includes CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, weakness CWE-288, and a vulnerable CPE for nvidia:triton_inference_server with versionEndExcluding 26.03. The source references include NVIDIA PSIRT advisory material, NVD, and the CVE.org record. No KEV entry was supplied.

Official resources

Publicly disclosed and recorded on 2026-05-20 in the supplied CVE/NVD data. No CISA KEV listing was provided in the source corpus.