Exclusive Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-23266

Critical NVIDIA Container Toolkit Vulnerability Enables Container Escape via OCI Hook Flaw: CVE-2025-23266 Explained

Vulnerability Overview 

CVE ID: CVE-2025-23266 

CVE Title: Critical Arbitrary Code Execution and Container Escape Vulnerability in NVIDIA Container Toolkit 

Severity: Critical  

Exploit Status: Public proof-of-concept (PoC) available 

Business Risk: Attackers can gain full root access from containers, allowing them to escalate privileges, steal data, disrupt operations, and control AI/cloud GPU workloads, risking serious damage and theft.

Summary

CVE-2025-23266 is a critical flaw in NVIDIA Container Toolkit (up to version 1.17.7) and GPU Operator (up to 25.3.0) caused by improper handling of OCI hooks, allowing attackers to inject malicious code via the LD_PRELOAD environment variable. This lets them execute code with root privileges on the host, breaking container isolation and compromising the entire system and workloads, especially in multi-tenant AI and cloud GPU environments. NVIDIA has patched this in Container Toolkit 1.17.8 and GPU Operator 25.3.1, and urges immediate updates and monitoring to prevent exploitation.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-23266?

Technical Overview

How Does the CVE-2025-23266 Exploit Work?

The attack typically follows these steps:

What Causes CVE-2025-23266?

Vulnerability Root Cause:  

The NVIDIA Container Toolkit has a flaw where it doesn’t properly check environment variables passed to its createContainer hook. Attackers can use this to load malicious code, which runs with root access on the host, breaking container isolation and giving them full control.

How Can You Mitigate CVE-2025-23266?

If immediate patching is delayed or not possible:  

  • Disable the enable-cuda-compat hook by setting disable-cuda-compat-lib-hook = true in /etc/nvidia-container-toolkit/config.toml for legacy container runtimes. 
  • For GPU Operator deployments, add disable-cuda-compat-lib-hook to the NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES via Helm arguments. 
  • Manually upgrade NVIDIA Container Toolkit to version 1.17.8 on affected hosts. 
  • Monitor container images and workloads for suspicious activity or unexpected environment variable changes related to OCI hooks. 
  • Restrict running untrusted or arbitrary container images on shared GPU infrastructure.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Will Patching CVE-2025-23266 Cause Downtime?

Patch application impact: Low. Updating to: 

  • NVIDIA Container Toolkit v1.17.8 
  • GPU Operator v25.3.1

These updates are straightforward and limited in scope. If you’re using CI/CD for deployments (e.g., Helm in Kubernetes), applying the updates should result in minimal to no downtime.

How Can You Detect CVE-2025-23266 Exploitation?

Exploitation Signatures:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Incident Response Considerations:

Compliance & Governance Notes

Audit Trail Requirement:

CVSS Breakdown Table

MetricValue Description
Base Score9.0Critical severity, indicating both high impact and ease of exploitation
Attack VectorAdjacent NetworkRequires access to shared GPU environment—not fully remote
Attack ComplexityLowStraightforward exploitation without special conditions
Privileges RequiredLow (container run privileges)No elevated privileges; ability to run a container suffices
User Interaction NoneExploit doesn’t rely on user input
Scope Changed Host is compromised beyond the initial container boundary
Confidentiality Impact HighAllows unauthorized access to host data and other workloads
Integrity ImpactHighFull host-level control permits altering critical files and configurations
Availability ImpactHighAttack can disrupt GPU services and host operations

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.