PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-24214 NVIDIA CVE debrief

CVE-2026-24214 is a high-severity vulnerability in NVIDIA Triton Inference Server’s DALI backend. According to the vendor-linked record, an attacker could trigger an integer overflow that may result in code execution, data tampering, or denial of service. The NVD record maps the issue to CWE-190 and identifies affected Triton Inference Server versions before 26.03.

Vendor
NVIDIA
Product
Triton Inference Server
CVSS
HIGH 8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-20
Advisory published
2026-05-20
Advisory updated
2026-05-20

Who should care

Organizations running NVIDIA Triton Inference Server, especially deployments that use or expose the DALI backend. Security teams, ML platform operators, and infrastructure owners should prioritize systems where external or authenticated users can submit inference workloads or otherwise interact with the service.

Technical summary

The NVD entry lists CVE-2026-24214 with CVSS 3.1 vector AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, indicating network-reachable impact, low attack complexity, limited privileges, and user interaction required. The weakness is classified as CWE-190 (integer overflow). The vulnerable CPE range in the record covers NVIDIA Triton Inference Server versions before 26.03.

Defensive priority

High. The combination of high confidentiality, integrity, and availability impact, plus network exposure and low attack complexity, makes this a priority issue for Triton deployments that may be reachable by untrusted users or integrated into multi-tenant environments.

Recommended defensive actions

  • Confirm whether NVIDIA Triton Inference Server is deployed and whether the DALI backend is enabled or reachable.
  • Identify installed versions and prioritize upgrading to a non-vulnerable release at or after 26.03, consistent with the NVD vulnerable-version range.
  • Restrict access to Triton endpoints to trusted networks and authenticated users while remediation is underway.
  • Review logging and workload submission paths for unexpected inputs or anomalous requests.
  • Track the NVIDIA PSIRT advisory and the NVD record for any follow-up guidance or clarifications.

Evidence notes

The official records supplied with this CVE state: NVIDIA Triton Inference Server is affected; the weakness is CWE-190; the CVSS vector is AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H; and the vulnerable CPE range ends before 26.03. NVD references the NVIDIA PSIRT advisory and the CVE.org record. The CVE and source timestamps supplied here show publication on 2026-05-20 with an update later the same day.

Official resources

Publicly disclosed in the official CVE and NVD records on 2026-05-20. The supplied timeline shows the record was updated later the same day. This debrief uses the CVE publication date for timing context.