Preface: On Linux, this typically manifests as:
- Unvalidated library loading (similar to LD_PRELOAD abuse).
- Potential exploitation via malicious shared objects ([.]so files) placed in search paths.
Attackers could leverage writable directories or environment variables (like LD_LIBRARY_PATH) to inject malicious code when Nsight starts profiling.
Background:
Nsight Compute – As an interactive kernel profiler for CUDA applications, Nsight Compute provides detailed performance metrics and API debugging via a user interface and command line tool. Nsight Compute also provides customizable and data-driven user interface and metric collection that can be extended with analysis scripts for post-processing results.
Nsight Graphics – This is a standalone development tool for debugging, profiling and analysing graphics applications. Nsight Graphics allows optimization of performance of Direct3D 11, Direct3D 12, DirectX Raytracing 1.1, OpenGL, Vulkan, and KHR Vulkan Ray Tracing Extension based applications.
Injection allows tools like NVIDIA Nsight Graphics to sit between your application and the graphics driver to intercept, record, and manipulate the stream of commands.
Don’t underestimate the value of independent developer workstations. Sometimes, these workstations may store product prototypes and notes. If this information is intellectual property, and the workstation is located within the development team’s network segment, a cyberattack could not only lead to information leaks but also cause financial losses!
Vulnerability details: CVE-2025-33206 – NVIDIA NSIGHT Graphics for Linux contains a vulnerability where an attacker could cause command injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and denial of service.
Remark: If Nsight runs with elevated permissions (common for GPU profiling), exploitation can lead to:
- Arbitrary code execution.
- Escalation of privileges.
- Data tampering or denial of service.
Official announcement: Please refer to the link for details –