PatchSiren cyber security CVE debrief
CVE-2026-24206 NVIDIA CVE debrief
CVE-2026-24206 is a high-severity authentication-bypass vulnerability in NVIDIA Triton Inference Server. NVD rates it 7.3 with a network attack vector, low complexity, and no privileges or user interaction required (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). NVIDIA identifies CWE-288, and the affected range in the NVD record is Triton Inference Server versions before 26.03. In practical terms, an exposed affected deployment could be abused to bypass authentication and potentially lead to unauthorized access, privilege escalation, denial of service, or information disclosure.
- Vendor
- NVIDIA
- Product
- Triton Inference Server
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-20
Who should care
Teams operating NVIDIA Triton Inference Server, especially internet-facing, shared, or production AI inference deployments, should treat this as a priority issue. Security and platform owners should focus on any instance running a version earlier than 26.03.
Technical summary
The official record describes an authentication bypass issue in NVIDIA Triton Inference Server. NVD lists the vulnerable CPE as nvidia:triton_inference_server with versions ending before 26.03 and assigns CWE-288. The CVSS vector indicates a remotely reachable issue with no auth or user interaction needed, and limited impacts to confidentiality, integrity, and availability. The NVD reference set points to NVIDIA PSIRT advisory material and the CVE record.
Defensive priority
High. A remotely exploitable authentication bypass in an inference server can directly undermine access controls and create follow-on risk for data exposure or service disruption. Prioritize affected Triton deployments that are exposed to untrusted networks or integrated into broader production workflows.
Recommended defensive actions
- Upgrade NVIDIA Triton Inference Server to version 26.03 or later, or otherwise move to a vendor-fixed release.
- Inventory all Triton Inference Server instances and confirm which ones are running affected versions before 26.03.
- Restrict network exposure of Triton services to trusted management and application networks until remediation is complete.
- Review authentication and access-control assumptions around any Triton deployment that may have been reachable by untrusted users.
- Monitor vendor advisories and NVD updates for any additional mitigation guidance or revised impact details.
Evidence notes
Source dates supplied for this record are 2026-05-20T04:16:45.713Z published and 2026-05-20T17:31:24.760Z modified. NVD marks the vulnerability status as Analyzed. The official metadata includes CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, weakness CWE-288, and a vulnerable CPE for nvidia:triton_inference_server with versionEndExcluding 26.03. The source references include NVIDIA PSIRT advisory material, NVD, and the CVE.org record. No KEV entry was supplied.
Official resources
-
CVE-2026-24206 CVE record
CVE.org
-
CVE-2026-24206 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed and recorded on 2026-05-20 in the supplied CVE/NVD data. No CISA KEV listing was provided in the source corpus.